Faculty of Engineering - Ain Shams University, Home
Quantum Computing and Security
What Will Learn?
-
Course AimsThe aim of this course is to provide students with the needed knowledge and skills which enable them to define and illustrate the power of quantum computation and encryption compared to classical ones. The mathematics used in the field are introduced. Basic quantum gates, circuits and protocols are presented as the foundations of quantum encryption systems like the quantum key distribution.
-
Course Goals
- Quality Education
- Affordable and Clean Energy
- Decent Work and Economic Growth
- Industry, Innovation and Infrastructure
- Responsible Consumption and Production
Requirements
CSE211s
Description
-
English Description
Quantum Computing, QUBITS, Postulates of quantum mechanics, Quantum information, No cloning, Quantum algorithms: Basic algorithms, Period finding, Quantum FT, Quantum communication, Quantum key distribution, Quantum secure communication, Quantum attacks, Post-quantum cryptography, Implementation Issues. -
Arabic Description
Quantum Computing, QUBITS, Postulates of quantum mechanics, Quantum information, No cloning, Quantum algorithms: Basic algorithms, Period finding, Quantum FT, Quantum communication, Quantum key distribution, Quantum secure communication, Quantum attacks, Post-quantum cryptography, Implementation Issues.
-
DepartmentComputer and Systems Engineering
-
Credit Hours2
-
GradesTotal ( 100 ) = Midterm (20) + tr.Student Activities (30 = tr.Industry 0% , tr.Project 10% , tr.Self_learning 0% , tr.Seminar 20% ) + Exam Grade (50)
-
HoursLecture Hours: 2, Tutorial Hours: 1, Lab Hours: 0
-
Required SWL100
-
Equivalent ECTS4
- Quantum Computing Explained, David McMahon, 2008, John Wiley & Sons - Banafa Ahmed. 2022. Quantum Computing and Other Transformative Technologies. Place of publication not identified: River.