 
      
    | You are here | quantumfrontiers.com | ||
| | | | | quantum.country | |
| | | | | Introduction to the core principles of quantum computation | |
| | | | | benjamintseng.com | |
| | | | | One of the most exciting areas of technology development, but that doesn't get a ton of mainstream media coverage, is the race to build a working quantum computer that exhibits "below threshold quantum computing" - the ability to do calculations utilizing quantum mechanics accurately. One of the key limitations to achieving this has been the... | |
| | | | | users.cms.caltech.edu | |
| | | | | Interactive proofs with quantum devices. | |
| | | | | www.jeremykun.com | |
| | | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition. | ||