ReferencesG. E. Moore, Electronics, 38 (1965), April 19 issue. This paper can be found at www.intel.com/research/silicon/mooreslaw/htm
Reprinted in J. S. Bell, Speakable and Unspeakable in Quantum Mechanics (Cambridge: Cambridge University Press, 1987), p. 139
Bollinger, J. J., Itano, W. M., Wineland, D. J. and Heinzen, D. J., Phys. Rev. A, 54 (1996), R4649; C. C. Gerry, Phys. Rev. A, 61 (2000), 043811
W. Heitler, The Quantum Theory of Radiation, 3rd edition (London: Oxford University Press, 1954)
Kok, P., Lee, H. and Dowling, J. P., Phys. Rev. A, 65 (2002), 052104
Gerry, C. C. and Campos, R. A., Phys. Rev. A, 64 (2001), 063814; C. C. Gerry, A. Benmoussa and R. A. Campos, Phys. Rev. A, 66 (2002), 013804
See, for example, Banaszek, K. and Walmsley, I. A., Opt. Lett. 28 (2003), 52; M. J. Fitch, B. C. Jacobs, T. B. Pittman and J. D. Franson, Phys. Rev. A, 68 (2003), 043814
Holland, M. J. and Burnett, K., Phys. Rev. Lett., 71 (1993), 1355
Campos, R. A., Gerry, C. C. and Benmoussa, A., Phys. Rev. A, 68 (2003), 023810
Bennett, C. H., Brassrad, G., Crepeau, C., Jozsa, R., Peres, A. and Wooters, W. K., Phys. Rev. Lett., 70 (1993), 1895
Boschi, D., Branca, S., Martini, F. and Hardy, L., Phys. Rev. Lett., 80 (1998), 1121
Bouwmeester, D., Pan, J.-W., Mattle, K., Eibl, M., Weinfurter, H. and Zeilinger, A., Nature, 390 (1997), 575
Furuwasa, A., S⊘rensen, J., Braunstein, S. L., Fuchs, C. A., Kimble, H. J. and Polzik, E. S., Science, 282 (1998), 706
R. Rivest, A. Shamir and L. Adleman, “On Digital Signatures and Public-Key Cryptosystems”, MIT Laboratory for Computer Science Technical Report, MIT/LCS/TR-212 (January 1979)
Deutsch, D., Proc. R. Soc. Lond. A 400 (1985), 97
Deutsch, D. and Jozsa, R., Proc. R. Soc. Lond. A 439 (1992), 553
P. W. Shor, in Proceedings of the 35th Symposium on Foundations of Computer Science, Los Alamitos, edited by S. Goldwasser (1994) (IEEE Computer Society Press), p. 124
Vandersypen, L. M. K., Steffen, M., Breyta, G., Yannoni, C. S., Sherwood, M. H. and Chuang, I. L., Nature, 414 (2001), 883
Bennett, C. H. and Brassard, G., in Proc. of IEEE Conference on Computers, Systems and Signal Processing (New York: IEEE Press, 1984). See also C. H. Bennett. F. Besette, G. Brassard, L. Salvail and J. Smolin, J. Cryptol., 5 (1992), 3
Bennett, C. H., Phys. Rev. Lett., 68 (1992), 3121
Ekert, A. K., Phys. Rev. Lett., 67 (1991), 661
Gisin, N., Ribordy, G., Tittel, W. and Zbinden, H., Rev. Mod. Phys., 74 (2002), 145
Guide, S., Riebe, M., Lancaster, G. P. T., Becher, C., Eschner, J., Häffner, H., Schmidt-Kaler, F., Chuang, I. L. and Blatt, R., Nature, 421 (2003), 48
Grover, L. K., Phys. Rev. Lett., 79 (1997), 325
Chuang, I. L. and Yamamoto, Y., Phys. Rev. A, 52 (1995), 3489
Fredkin, E. and Toffoli, T., Int. J. Theor. Phys., 21 (1982), 219
Milburn, G. J., Phys. Rev. A, 62 (1989), 2124
O'Brien, J. L., Pryde, G. J., White, A. G., Ralph, T. C. and Branning, D., Nature, 426 (2003), 264
Knill, E., Laflamme, R. and Milburn, G., Nature, 409 (2001), 46
See Sleator, T. and Weinfurter, H., Phys. Rev. Lett., 74 (1995), 4087; P. Domokos, J. M. Raimond, M. Brune and S. Haroche, Phys. Rev. A, 52 (1995), 3554
See Monroe, C., Meekhof, D. M., King, B. E., Itano, W. M. and Wineland, D. J., Phys. Rev. Lett., 75 (1995), 4714
See Meacher, D. R., Contemp. Phys., 39 (1998), 329; I. H. Deutsch and G. K. Brennen, Forts. Phys., 48 (2000), 925
Calderbank, A. and Shor, P., Phys. Rev. A, 52 (1995), R2493; Phys. Rev. A, 54 (1996), 1098; A. M. Steane, Phys. Rev. Lett., 77 (1995), 793
Palma, G. M., Suominen, K.-A. and Ekert, A. K., Proc. R. Soc. Lond., A 452 (1996), 567
Lidar, D., Chuang, I. L. and Whaley, B., Phys. Rev. Lett., 81 (1998), 2594
BibliographyP. Garrett, Making and Breaking Codes: An Introduction to Cryptology (Upper Saddle River: Prentice Hall, 2001)
S. Singh, The Code Book: The Science of Secrecy from Ancient Eygpt to Quantum Cryptography (New York: Anchor Books, 1999)
H.-K. Lo, S. Popescu and T. Spliller (editors), Introduction to Quantum Computation and Quantum Information (Singapore: World Scientific, 1998)
D. Bouwmeester, A. K. Ekert and A. Zeilinger (editors), The Physics of Quantum Information (Berlin: Springer, 2000)
M. Nielsen and I. L. Chuang, Quantum Information and Quantum Computation (Cambridge: Cambridge University Press, 2001)
S. L. Braunstein and H.-K. Lo, Scalable Quantum Computers (Berlin: Wiley-VCH, 2001)
Barenco, A., “Quantum physics and computers”, Contemp. Phys., 37 (1996), 375
DiVincenzo, D. P., “Quantum Computation”, Science, 270 (1995), 255
Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L. and Schauer, M., “Quantum cryptography”, Contemp. Phys., 36 (1995), 149
Phoenix, S. J. D. and Townsend, P. D., “Quantum cryptography: how to beat the code breakers using quantum mechanics”, Contemp. Phys., 36 (1995), 165
Plenio, M. B. and Vedral, V., “Teleportation, entanglement and thermodynamics in the quantum world”, Contemp. Phys., 39 (1998), 431