Skip to content

Protecting Information From Classical Error Correction to Quantum Cryptography

Best in textbook rentals since 2012!

ISBN-10: 052182740X

ISBN-13: 9780521827409

Edition: 2006

Authors: Susan Loepp, William K. Wootters

List price: $140.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the potential impacts of quantum physics: (i) a quantum computer, if built, could crack our currently…    
Customers also bought

Book details

List price: $140.00
Copyright year: 2006
Publisher: Cambridge University Press
Publication date: 7/10/2006
Binding: Hardcover
Pages: 304
Size: 6.30" wide x 9.57" long x 0.79" tall
Weight: 1.210
Language: English

Susan Loepp is an Associate Professor of Mathematics in the Department of Mathematics and Statistics at Williams College. Her research is in commutative algebra, focusing on completions of local rings.

William K. Wootters, a Fellow of the American Physical Society, is the Barclay Jermain Professor of Natural Philosophy in the Department of Physics at Williams College. He does research on quantum entanglement and other aspects of quantum information theory.

Cryptography: an overview
Quantum mechanics
Quantum cryptography
An introduction to error-correcting codes
Quantum cryptography revisited
Generalized Reed-Solomon codes
Quantum computing
Appendix