كلية الهندسة - جامعة عين شمس, الرئيسية
Quantum Computing and Security
What Will Learn?
-
Course AimsThe aim of this course is to provide students with the needed knowledge and skills which enable them to define and illustrate the power of quantum computation and encryption compared to classical ones. The mathematics used in the field are introduced. Basic quantum gates, circuits and protocols are presented as the foundations of quantum encryption systems like the quantum key distribution.
-
Course Goals
- Quality Education
- Affordable and Clean Energy
- Decent Work and Economic Growth
- Industry, Innovation and Infrastructure
- Responsible Consumption and Production
Requirements
CSE211s
Description
-
English Description
Quantum Computing, QUBITS, Postulates of quantum mechanics, Quantum information, No cloning, Quantum algorithms: Basic algorithms, Period finding, Quantum FT, Quantum communication, Quantum key distribution, Quantum secure communication, Quantum attacks, Post-quantum cryptography, Implementation Issues. -
Arabic Description
Quantum Computing, QUBITS, Postulates of quantum mechanics, Quantum information, No cloning, Quantum algorithms: Basic algorithms, Period finding, Quantum FT, Quantum communication, Quantum key distribution, Quantum secure communication, Quantum attacks, Post-quantum cryptography, Implementation Issues.
-
قسمهندسة الحاسبات والنظم
-
الساعات المعتمدة2
-
الدرجاتالإجمالي ( 100 ) = نصف العام (20) + tr.Student Activities (30 = tr.Industry 0% , tr.Project 10% , tr.Self_learning 0% , tr.Seminar 20% ) + درجة الامتحان (50)
-
الساعاتساعات المحاضرة: 2, ساعات التعليم: 1, ساعات المعمل: 0
-
Required SWL100
-
Equivalent ECTS4
- Quantum Computing Explained, David McMahon, 2008, John Wiley & Sons - Banafa Ahmed. 2022. Quantum Computing and Other Transformative Technologies. Place of publication not identified: River.