Explore >> Select a destination


You are here

quantumfrontiers.com
| | quantum.country
14.4 parsecs away

Travel
| | Introduction to the core principles of quantum computation
| | benjamintseng.com
12.3 parsecs away

Travel
| | One of the most exciting areas of technology development, but that doesn't get a ton of mainstream media coverage, is the race to build a working quantum computer that exhibits "below threshold quantum computing" - the ability to do calculations utilizing quantum mechanics accurately. One of the key limitations to achieving this has been the...
| | users.cms.caltech.edu
12.0 parsecs away

Travel
| | Interactive proofs with quantum devices.
| | www.jeremykun.com
45.8 parsecs away

Travel
| So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.