Wikipedia description of “Quantum computer.”
http://en.wikipedia.org/wiki/Quantum_computer
A quantum computer is a device for computation that makes direct use of quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), quantum computation utilize quantum properties to represent data and perform operations on these data.^{[1]} A theoretical model is the quantum Turing machine, also known as the universal quantum computer. Quantum computers share theoretical similarities with nondeterministic and probabilistic computers, like the ability to be in more than one state simultaneously. The field of quantum computing was first introduced by Richard Feynman in 1982.^{[2]}
Although quantum computing is still in its infancy, experiments have been carried out in which quantum computational operations were executed on a very small number ofqubits (quantum bits). Both practical and theoretical research continues, and many national government and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis.^{[3]}
Largescale quantum computers could be able to solve certain problems much faster than any classical computer by using the best currently known algorithms, like integer factorization using Shor’s algorithm or the simulation of quantum manybody systems. There exist quantum algorithms, such as Simon’s algorithm, which run faster than any possible probabilistic classical algorithm.^{[4]} Given unlimited resources, a classical computer can simulate an arbitrary quantum algorithm so quantum computation does not violate the Church–Turing thesis.^{[5]} However, in practice infinite resources are never available and the computational basis of 500 qubits, for example, would already be too large to be represented on a classical computer because it would require 2^{500} complex values to be stored.^{[6]} Nielsen and Chuang point out that “Trying to store all these complex numbers would not be possible on any conceivable classical computer.” ^{[7]}
Contents[hide]

Basis
A classical computer has a memory made up of bits, where each bit represents either a one or a zero. A quantum computer maintains a sequence of qubits. A single qubit can represent a one, a zero, or, crucially, any quantum superposition of these; moreover, a pair of qubits can be in any quantum superposition of 4 states, and three qubits in any superposition of 8. In general a quantum computer with n qubits can be in an arbitrary superposition of up to 2^{n} different states simultaneously (this compares to a normal computer that can only be in one of these 2^{n} states at any one time). A quantum computer operates by manipulating those qubits with a fixed sequence of quantum logic gates. The sequence of gates to be applied is called aquantum algorithm.
An example of an implementation of qubits for a quantum computer could start with the use of particles with two spin states: “down” and “up” (typically written and , or and ). But in fact any system possessing an observable quantity A which is conserved under time evolution and such that A has at least two discrete and sufficiently spaced consecutive eigenvalues, is a suitable candidate for implementing a qubit. This is true because any such system can be mapped onto an effective spin1/2 system.
Bits vs. qubits
A quantum computer with a given number of qubits is fundamentally different from a classical computer composed of the same number of classical bits. For example, to represent the state of an nqubit system on a classical computer would require the storage of 2^{n} complex coefficients. Although this fact may seem to indicate that qubits can hold exponentially more information than their classical counterparts, care must be taken not to overlook the fact that the qubits are only in a probabilistic superposition of all of their states. This means that when the final state of the qubits is measured, they will only be found in one of the possible configurations they were in before measurement. Moreover, it is incorrect to think of the qubits as only being in one particular state before measurement since the fact that they were in a superposition of states before the measurement was made directly affects the possible outcomes of the computation.
Qubits are made up of controlled particles and the means of control (e.g. devices that trap particles and switch them from one state to another).^{[8]}
For example: Consider first a classical computer that operates on a threebitregister. The state of the computer at any time is a probability distribution over the2^{3} = 8 different threebit strings 000, 001, 010, 011, 100, 101, 110, 111. If it is a deterministic computer, then it is in exactly one of these states with probability 1. However, if it is a probabilistic computer, then there is a possibility of it being in anyone of a number of different states. We can describe this probabilistic state by eight non negative numbers A,B,C,D,E,F,G,H(where A = probability computer is in state000, B = probability computer is in state001, etc.). There is a restriction that these probabilities sum to 1.
The state of a threequbit quantum computer is similarly described by an eightdimensional vector (a,b,c,d,e,f,g,h), called a ket. However, instead of adding to one, the sum of the squares of the coefficient magnitudes,  a  ^{2} +  b  ^{2} + … +  h  ^{2}, must equal one. Moreover, the coefficients are complex numbers. Since the probability amplitudes of the states are represented with complex numbers, the phase between any two states is a meaningful parameter, which is a key difference between quantum computing and probabilistic classical computing.^{[9]}
If you measure the three qubits, you will observe a threebit string. The probability of measuring a given string is the squared magnitude of that string’s coefficient (i.e., the probability of measuring 000 =  a  ^{2}, the probability of measuring 001 =  b  ^{2}, etc..). Thus, measuring a quantum state described by complex coefficients (a,b,…,h) gives the classical probability distribution (  a  ^{2},  b  ^{2},…,  h  ^{2}) and we say that the quantum state “collapses” to a classical state as a result of making the measurement.
Note that an eightdimensional vector can be specified in many different ways depending on what basis is chosen for the space. The basis of bit strings (e.g., 000, 001, …, 111) is known as the computational basis. Other possible bases are unitlength, orthogonal vectors and the eigen vectors of the Paulix operator. Ket notation is often used to make the choice of basis explicit. For example, the state (a,b,c,d,e,f,g,h) in the computational basis can be written as:
 where, e.g.,
The computational basis for a single qubit (two dimensions) is and .
Using the eigen vectors of the Paulix operator, a single qubit is and .
Operation
While a classical threebit state and a quantum threequbit state are both eightdimensional vectors, they are manipulated quite differently for classical or quantum computation. For computing in either case, the system must be initialized, for example into the allzeros string, , corresponding to the vector (1,0,0,0,0,0,0,0). In classical randomized computation, the system evolves according to the application of stochastic matrices, which preserve that the probabilities add up to one (i.e., preserve the L1 norm). In quantum computation, on the other hand, allowed operations are unitary matrices, which are effectively rotations (they preserve that the sum of the squares add up to one, the Euclidean or L2 norm). (Exactly what unitaries can be applied depend on the physics of the quantum device.) Consequently, since rotations can be undone by rotating backward, quantum computations are reversible. (Technically, quantum operations can be probabilistic combinations of unitaries, so quantum computation really does generalize classical computation. See quantum circuit for a more precise formulation.)
Finally, upon termination of the algorithm, the result needs to be read off. In the case of a classical computer, we sample from the probability distribution on the threebit register to obtain one definite threebit string, say 000. Quantum mechanically, wemeasure the threequbit state, which is equivalent to collapsing the quantum state down to a classical distribution (with the coefficients in the classical state being the squared magnitudes of the coefficients for the quantum state, as described above), followed by sampling from that distribution. Note that this destroys the original quantum state. Many algorithms will only give the correct answer with a certain probability. However, by repeatedly initializing, running and measuring the quantum computer, the probability of getting the correct answer can be increased.
For more details on the sequences of operations used for various quantum algorithms, see universal quantum computer, Shor’s algorithm, Grover’s algorithm,DeutschJozsa algorithm, amplitude amplification, quantum Fourier transform,quantum gate, quantum adiabatic algorithm and quantum error correction.
Potential
Integer factorization is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300digit primes).^{[10]} By comparison, a quantum computer could efficiently solve this problem using Shor’s algorithm to find its factors. This ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers (or the related discrete logarithm problem, which can also be solved by Shor’s algorithm), including forms of RSA. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.
However, other existing cryptographic algorithms do not appear to be broken by these algorithms.^{[11]}^{[12]} Some publickey algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor’s algorithm applies, like the McEliece based on a problem in coding theory.^{[11]}^{[13]}Lattice based cryptosy stems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based crypto systems, is a wellstudied open problem.^{[14]} It has been proven that applying Grover’s algorithm to break a symmetric (secret key) algorithm by brute force requires roughly 2^{n/2} invocations of the underlying cryptographic algorithm, compared with roughly 2^{n} in the classical case,^{[15]} meaning that symmetric key lengths are effectively halved: AES256 would have the same security against an attack using Grover’s algorithm that AES128 has against classical bruteforce search (see Key size). Quantum cryptography could potentially fulfill some of the functions of public key cryptography.
Besides factorization and discrete logarithms, quantum algorithms offering a more than polynomial speedup over the best known classical algorithm have been found for several problems,^{[16]} including the simulation of quantum physical processes from chemistry and solid state physics, the approximation of Jones polynomials, and solving Pell’s equation. No mathematical proof has been found that shows that an equally fast classical algorithm cannot be discovered, although this is considered unlikely. For some problems, quantum computers offer a polynomial speedup. The most wellknown example of this is quantum database search, which can be solved by Grover’s algorithm using quadratically fewer queries to the database than are required by classical algorithms. In this case the advantage is provable. Several other examples of provable quantum speedups for query problems have subsequently been discovered, such as for finding collisions in twotoone functions and evaluating NAND trees.
Consider a problem that has these four properties:
 The only way to solve it is to guess answers repeatedly and check them,
 The number of possible answers to check is the same as the number of inputs,
 Every possible answer takes the same amount of time to check, and
 There are no clues about which answers might be better: generating possibilities randomly is just as good as checking them in some special order.
An example of this is a password cracker that attempts to guess the password for an encrypted file (assuming that the password has a maximum possible length).
For problems with all four properties, the time for a quantum computer to solve this will be proportional to the square root of the number of inputs. That can be a very large speedup, reducing some problems from years to seconds. It can be used to attack symmetric ciphers such as Triple DES and AES by attempting to guess the secret key.
Grover’s algorithm can also be used to obtain a quadratic speedup over a bruteforce search for a class of problems known as NPcomplete.
Since chemistry and nanotechnology rely on understanding quantum systems, and such systems are impossible to simulate in an efficient manner classically, many believe quantum simulation will be one of the most important applications of quantum computing.^{[17]}
There are a number of technical challenges in building a largescale quantum computer, and thus far quantum computers have yet to solve a problem faster than a classical computer. David DiVincenzo, of IBM, listed the following requirements for a practical quantum computer:^{[18]}
 scalable physically to increase the number of qubits;
 qubits can be initialized to arbitrary values;
 quantum gates faster than decoherence time;
 universal gate set;
 qubits can be read easily.
Quantum decoherence
One of the greatest challenges is controlling or removing quantum decoherence. This usually means isolating the system from its environment as interactions with the external world causes the system to decohere. This effect is irreversible, as it is nonunitary, and is usually something that should be highly controlled, if not avoided. Decoherence times for candidate systems, in particular the transverse relaxation time T_{2} (for NMR and MRI technology, also called the dephasing time), typically range between nanoseconds and seconds at low temperature.^{[9]}
These issues are more difficult for optical approaches as the timescales are orders of magnitude shorter and an oftencited approach to overcoming them is optical pulse shaping. Error rates are typically proportional to the ratio of operating time to decoherence time, hence any operation must be completed much more quickly than the decoherence time.
If the error rate is small enough, it is thought to be possible to use quantum error correction, which corrects errors due to decoherence, thereby allowing the total calculation time to be longer than the decoherence time. An often cited figure for required error rate in each gate is 10^{−4}. This implies that each gate must be able to perform its task in one 10,000th of the decoherence time of the system.
Meeting this scalability condition is possible for a wide range of systems. However, the use of error correction brings with it the cost of a greatly increased number of required qubits. The number required to factor integers using Shor’s algorithm is still polynomial, and thought to be between L and L^{2}, where L is the number of bits in the number to be factored; error correction algorithms would inflate this figure by an additional factor of L. For a 1000bit number, this implies a need for about 10^{4} qubits without error correction.^{[19]} With error correction, the figure would rise to about 10^{7}qubits. Note that computation time is about L^{2} or about 10^{7} steps and on 1 MHz, about 10 seconds.
A very different approach to the stabilitydecoherence problem is to create atopological quantum computer with anyons, quasiparticles used as threads and relying on braid theory to form stable logic gates.^{[20]}^{[21]}
[edit]Developments
There are a number of quantum computing models, distinguished by the basic elements in which the computation is decomposed. The four main models of practical importance are
 the quantum gate array (computation decomposed into sequence of fewqubit quantum gates),
 the oneway quantum computer (computation decomposed into sequence of onequbit measurements applied to a highly entangled initial state (cluster state)),
 the adiabatic quantum computer (computation decomposed into a slow continuous transformation of an initial Hamiltonian into a final Hamiltonian, whose ground states contains the solution),
 and the topological quantum computer^{[22]} (computation decomposed into the braiding of anyons in a 2D lattice)
The Quantum Turing machine is theoretically important but direct implementation of this model is not pursued. All four models of computation have been shown to be equivalent to each other in the sense that each can simulate the other with no more than polynomial overhead.
For physically implementing a quantum computer, many different candidates are being pursued, among them (distinguished by the physical system used to realize the qubits):
 Superconductorbased quantum computers (including SQUIDbased quantum computers)^{[23]}^{[24]} (qubit implemented by the state of small superconducting circuits (Josephson junctions))
 Trapped ion quantum computer (qubit implemented by the internal state of trapped ions)
 Optical lattices (qubit implemented by internal states of neutral atoms trapped in an optical lattice)
 electricallydefined or selfassembled quantum dots (e.g. the LossDiVincenzo quantum computer or ^{[25]}) (qubit given by the spin states of an electron trapped in the quantum dot)
 Quantum dot charge based semiconductor quantum computer (qubit is the position of an electron inside a double quantum dot) ^{[26]}
 Nuclear magnetic resonance on molecules in solution (liquidstate NMR) (qubit provided by nuclear spins within the dissolved molecule)
 Solidstate NMR Kane quantum computers (qubit realized by the nuclear spin state of phosphorus donors in silicon)
 Electronsonhelium quantum computers (qubit is the electron spin)
 Cavity quantum electrodynamics (CQED) (qubit provided by the internal state of atoms trapped in and coupled to highfinesse cavities)
 Molecular magnet
 Fullerenebased ESR quantum computer (qubit based on the electronic spin of atoms or molecules encased in fullerene structures)
 Opticsbased quantum computer (Quantum optics) (qubits realized by appropriate states of different modes of the electromagnetic field, e.g.^{[27]})
 Diamondbased quantum computer^{[28]}^{[29]}^{[30]} (qubit realized by the electronic or nuclear spin of Nitrogenvacancy centers in diamond)
 Bose–Einstein condensatebased quantum computer^{[31]}
 Transistorbased quantum computer – string quantum computers with entrainment of positive holes using an electrostatic trap
 Rareearthmetaliondoped inorganic crystal based quantum computers^{[32]}^{[33]}(qubit realized by the internal electronic state of dopants in optical fibers)
The large number of candidates demonstrates that the topic, in spite of rapid progress, is still in its infancy. But at the same time, there is also a vast amount of flexibility.
In 2005, researchers at the University of Michigan built a semiconductor chip that functioned as an ion trap. Such devices, produced by standard lithography techniques, may point the way to scalable quantum computing tools.^{[34]} An improved version was made in 2006.^{[citation needed]}
In 2009, researchers at Yale University created the first rudimentary solidstate quantum processor. The twoqubit superconducting chip was able to run elementary algorithms. Each of the two artificial atoms (or qubits) were made up of a billion aluminum atoms but they acted like a single one that could occupy two different energy states.^{[35]}^{[36]}
Another team, working at the University of Bristol, also created a siliconbased quantum computing chip, based on quantum optics. The team was able to run Shor’s algorithm on the chip.^{[37]} Further developments were made in 2010.^{[38]} Springer publishes a journal (“Quantum Information Processing”) devoted to the subject.^{[39]}
A team of scientists from Australia and Japan have finally made a breakthrough in quantum teleportation. They have successfully transferred a complex set of quantum data with full transmission integrity achieved. Also the qubits being destroyed in one place but instantaneously resurrected in another, without affecting their superpositions.^{[40]}
Photograph of a chip constructed by DWave Systems Inc., mounted and wirebonded in a sample holder. The DWave processor is designed to use 128superconducting logic elements that exhibit controllable and tunable coupling to perform operations.
In 2011, DWave Systems announced the first commercial quantum annealer on the market by the name DWave One. The company claims this system uses a 128 qubit processor chipset.^{[41]}On May 25, 2011 DWave announced that Lockheed Martin Corporation entered into an agreement to purchase a DWave One system.^{[42]} Lockheed Martin and the University of Southern California (USC) reached an agreement to house the DWave One Adiabatic Quantum Computer at the newly formed USC Lockheed Martin Quantum Computing Center, part of USC’s Information Sciences Institute campus in Marina del Rey^{[43]}. This made USC became the first academic institution to house a commercial quantum computer. The $10million computer was purchased by Lockheed Martin Corporation with the intention of harnessing the technology to solve relevant problems that are hard to address through established methods in a “costeffective” manner.
During the same year, researchers working at the University of Bristol created an allbulk optics system able to run an iterative version of Shor’s algorithm. They successfully managed to factorize 21.^{[44]}
Relation to computational complexity theory
The suspected relationship of BQP to other problem spaces.^{[45]}
The class of problems that can be efficiently solved by quantum computers is called BQP, for “bounded error, quantum, polynomial time”. Quantum computers only runprobabilistic algorithms, so BQP on quantum computers is the counterpart of BPP (“bounded error, probabilistic, polynomial time”) on classical computers. It is defined as the set of problems solvable with a polynomialtime algorithm, whose probability of error is bounded away from one half.^{[46]} A quantum computer is said to “solve” a problem if, for every instance, its answer will be right with high probability. If that solution runs in polynomial time, then that problem is in BQP.
BQP is contained in the complexity class #P (or more precisely in the associated class of decision problems P^{#P}),^{[47]} which is a subclass of PSPACE.
BQP is suspected to be disjoint from NPcomplete and a strict superset of P, but that is not known. Both integer factorization and discrete log are in BQP. Both of these problems are NP problems suspected to be outside BPP, and hence outside P. Both are suspected to not be NPcomplete. There is a common misconception that quantum computers can solve NPcomplete problems in polynomial time. That is not known to be true, and is generally suspected to be false.^{[47]}
Possibilities of the quantum computer to accelerate classical algorithms has rigid limits — upper bounds of quantum computation’s complexity. The overwhelming part of classical calculations cannot be accelerated on the quantum computer.^{[48]} A similar fact takes place for particular computational tasks, like the search problem, for which Grover’s algorithm is optimal.^{[49]}
Although quantum computers may be faster than classical computers, those described above can’t solve any problems that classical computers can’t solve, given enough time and memory (however, those amounts might be practically infeasible). ATuring machine can simulate these quantum computers, so such a quantum computer could never solve an undecidable problem like the halting problem. The existence of “standard” quantum computers does not disprove the Church–Turing thesis.^{[50]} It has been speculated that theories of quantum gravity, such as Mtheoryor loop quantum gravity, may allow even faster computers to be built. Currently,defining computation in such theories is an open problem due to the problem of time, i.e. there currently exists no obvious way to describe what it means for an observer to submit input to a computer and later receive output.^{[51]}
See also
Wikimedia Commons has media related to: Quantum computer 
 Normal mode
 Chemical computer
 DNA computer
 Photonic computing
 Postquantum cryptography
 Quantum bus
 Topological quantum computer
 Timeline of quantum computing
 List of emerging technologies
 Quantum gate
References
 ^ “Quantum Computing with Molecules” article in Scientific American by Neil Gershenfeld and Isaac L. Chuang
 ^ Quantum computation. David Deutsch, Physics World, 1/6/92
 ^ Quantum Information Science and Technology Roadmap for a sense of where the research is heading.
 ^ Simon, D.R. (1994). “On the power of quantum computation”. Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on: 116–123.
 ^ Nielsen, Michael A.; Chuang, Isaac L.. Quantum Computation and Quantum Information. p. 202.
 ^ Nielsen, Michael A.; Chuang, Isaac L.. Quantum Computation and Quantum Information. p. 17.
 ^ Nielsen, Michael A.; Chuang, Isaac L.. Quantum Computation and Quantum Information. p. 17.
 ^ Waldner, JeanBaptiste (2007). Nanocomputers and Swarm Intelligence. London: ISTE. p. 157. ISBN 2746215160.
 ^ ^{a} ^{b} David P. DiVincenzo (1995). “Quantum Computation”. Science 270 (5234): 255–261. Bibcode 1995Sci…270..255D. doi:10.1126/science.270.5234.255.
 ^ Arjen K. Lenstra (2000). “Integer Factoring”. Designs, Codes and Cryptography 19: 101–128.
 ^ ^{a} ^{b} Daniel J. Bernstein, Introduction to PostQuantum Cryptography. Introduction to Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen (editors). Postquantum cryptography. Springer, Berlin, 2009. ISBN 9783540887010
 ^ See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing.
 ^ Robert J. McEliece. “A publickey cryptosystem based on algebraic coding theory.” Jet Propulsion Laboratory DSN Progress Report 42–44, 114–116.
 ^ Kobayashi, H.; Gall, F.L. (2006). “Dihedral Hidden Subgroup Problem: A Survey”. Information and Media Technologies 1 (1): 178–185.
 ^ Bennett C.H., Bernstein E., Brassard G., Vazirani U., The strengths and weaknesses of quantum computation. SIAM Journal on Computing 26(5): 1510–1523 (1997).
 ^ Quantum Algorithm Zoo – Stephen Jordan’s Homepage
 ^ The Father of Quantum Computing By Quinn Norton 02.15.2007, Wired.com
 ^ David P. DiVincenzo, IBM (20000413). “The Physical Implementation of Quantum Computation”. arXiv:quantph/0002077 [quantph].
 ^ M. I. Dyakonov, Université Montpellier (20061014). “Is FaultTolerant Quantum Computation Really Possible?”. In: Future Trends in Microelectronics. Up the Nano Creek, S. Luryi, J. Xu, and A. Zaslavsky (eds), Wiley , pp.: 4–18.arXiv:quantph/0610117.
 ^ Freedman, Michael; Alexei Kitaev, Michael Larsen, Zhenghan Wang (20021020). “Topological Quantum Computation”. Bulletin of the American Mathematical Society 40 (1): 31–38. doi:10.1090/S0273097902009643.
 ^ Monroe, Don, Anyons: The breakthrough quantum computing needs?, New Scientist, 1 October 2008
 ^ Nayak, Chetan; Simon, Steven; Stern, Ady; Das Sarma, Sankar (2008). “Nonabelian Anyons and Quantum Computation”. Rev Mod Phys 80 (3): 1083.arXiv:0707.1889. Bibcode 2008RvMP…80.1083N.doi:10.1103/RevModPhys.80.1083.
 ^ Clarke, John; Wilhelm, Frank (June 19, 2008). “Superconducting quantum bits”. Nature 453 (7198): 1031–1042. Bibcode 2008Natur.453.1031C.doi:10.1038/nature07128. PMID 18563154.
 ^ William M Kaminsky (2004). “Scalable Superconducting Architecture for Adiabatic Quantum Computation”. arXiv:quantph/0403090 [quantph].
 ^ Imamoğlu, Atac; Awschalom, D. D.; Burkard, Guido; DiVincenzo, D. P.; Loss, D.; Sherwin, M.; Small, A. (1999). “Quantum information processing using quantum dot spins and cavityQED”. Physical Review Letters 83 (20): 4204.Bibcode 1999PhRvL..83.4204I. doi:10.1103/PhysRevLett.83.4204.
 ^ Fedichkin, Leonid; Yanchenko, Maxim; Valiev, Kamil (2000). “Novel coherent quantum bit using spatial quantization levels in semiconductor quantum dot”.Quantum Computers and Computing 1: 58–76. arXiv:quantph/0006097.Bibcode 2000quant.ph..6097F.
 ^ Knill, G. J.; Laflamme, R.; Milburn, G. J. (2001). “A scheme for efficient quantum computation with linear optics”. Nature 409 (6816): 46. Bibcode2001Natur.409…46K. doi:10.1038/35051009. PMID 11343107.
 ^ Nizovtsev, A. P. et al. (October 19, 2004). “A quantum computer based on NV centers in diamond: Optically detected nutations of single electron and nuclear spins”. Optics and Spectroscopy 99 (2): 248–260. Bibcode2005OptSp..99..233N. doi:10.1134/1.2034610.
 ^ Wolfgang Gruener, TG Daily (20070601). “Research indicates diamonds could be key to quantum storage”. Retrieved 20070604.
 ^ Neumann, P. et al. (June 6, 2008). “Multipartite Entanglement Among Single Spins in Diamond”. Science 320 (5881): 1326–1329. Bibcode2008Sci…320.1326N. doi:10.1126/science.1157233. PMID 18535240.
 ^ Rene Millman, IT PRO (20070803). “Trapped atoms could advance quantum computing”. Retrieved 20070726.
 ^ Ohlsson, N.; Mohan, R. K.; Kröll, S. (January 1, 2002). “Quantum computer hardware based on rareearthiondoped inorganic crystals”. Opt. Commun. 201(1–3): 71–77. Bibcode 2002OptCo.201…71O. doi:10.1016/S00304018(01)016662.
 ^ Longdell, J. J.; Sellars, M. J.; Manson, N. B. (September 23, 2004). “Demonstration of conditional quantum phase shift between ions in a solid”.Phys. Rev. Lett. 93 (13): 130503. arXiv:quantph/0404083. Bibcode2004PhRvL..93m0503L. doi:10.1103/PhysRevLett.93.130503.PMID 15524694.
 ^ Ann Arbor (20051212). “UM develops scalable and massproducible quantum computer chip”. Retrieved 20061117.
 ^ Dicarlo, L; Chow, JM; Gambetta, JM; Bishop, LS; Johnson, BR; Schuster, DI; Majer, J; Blais, A et al. (20090628). “Demonstration of twoqubit algorithms with a superconducting quantum processor”. Nature 460 (7252): 240–4. Bibcode2009Natur.460..240D. doi:10.1038/nature08121. PMID 19561592. Retrieved 20090702.
 ^ “Scientists Create First Electronic Quantum Processor”. 20090702. Retrieved 20090702.
 ^ New Scientist (20090904). “Codebreaking quantum algorithm runs on a silicon chip”. Retrieved 20091014.
 ^ “New Trends in Quantum Computation”.
 ^ Quantum Information Processing. Springer.com. Retrieved on 20110519.
 ^ “University of New South Wales”.
 ^ “Learning to program the DWave One”. Retrieved 11 May 2011.
 ^ “DWave Systems sells its first Quantum Computing System to Lockheed Martin Corporation”. 20110525. Retrieved 20110530.
 ^ “Operational Quantum Computing Center Established at USC”. 20111029. Retrieved 20111206.
 ^ Enrique Martin Lopez, Anthony Laing, Thomas Lawson, Roberto Alvarez, XiaoQi Zhou, Jeremy L. O’Brien. “Implementation of an iterative quantum order finding algorithm”.
 ^ Nielsen, p. 42
 ^ Nielsen, p. 41
 ^ ^{a} ^{b} Bernstein, Ethan; Vazirani, Umesh (1997). “Quantum Complexity Theory”.SIAM Journal on Computing 26 (5): 1411. doi:10.1137/S0097539796300921.
 ^ Ozhigov, Yuri (1999). “Quantum Computers Speed Up Classical with Probability Zero”. Chaos Solitons Fractals 10 (10): 1707–1714. arXiv:quantph/9803064. Bibcode 1998quant.ph..3064O. doi:10.1016/S09600779(98)002264.
 ^ Ozhigov, Yuri (1999). “Lower Bounds of Quantum Search for Extreme Point”.Proc.Roy.Soc.Lond. A455 (1986): 2165–2172. arXiv:quantph/9806001.Bibcode 1999RSPSA.455.2165O. doi:10.1098/rspa.1999.0397.
 ^ Nielsen, p. 126
 ^ Scott Aaronson, NPcomplete Problems and Physical Reality, ACM SIGACTNews, Vol. 36, No. 1. (March 2005), pp. 30–52, section 7 “Quantum Gravity”: “[…] to anyone who wants a test or benchmark for a favorite quantum gravity theory,[author’s footnote: That is, one without all the bother of making numerical predictions and comparing them to observation] let me humbly propose the following: can you define Quantum Gravity PolynomialTime? […] until we can say what it means for a ‘user’ to specify an ‘input’ and ‘later’ receive an ‘output’—there is no such thing as computation, not even theoretically.” (emphasis in original)
Bibliography
 Nielsen, Michael and Chuang, Isaac (2000). Quantum Computation and Quantum Information. Cambridge: Cambridge University Press. ISBN 0521635039.OCLC 174527496.
General references
 Derek Abbott, Charles R. Doering, Carlton M. Caves, Daniel M. Lidar, Howard E. Brandt, Alexander R. Hamilton, David K. Ferry, Julio GeaBanacloche, Sergey M. Bezrukov, and Laszlo B. Kish (2003). “Dreams versus Reality: Plenary Debate Session on Quantum Computing”. Quantum Information Processing 2 (6): 449–472. arXiv:quantph/0310130. doi:10.1023/B:QINP.0000042203.24782.9a.hdl:2027.42/45526.
 David P. DiVincenzo (2000). “The Physical Implementation of Quantum Computation”. Experimental Proposals for Quantum Computation. arXiv:quantph/0002077
 David P. DiVincenzo (1995). “Quantum Computation”. Science 270 (5234): 255–261. Bibcode 1995Sci…270..255D. doi:10.1126/science.270.5234.255. Table 1 lists switching and dephasing times for various systems.
 Richard Feynman (1982). “Simulating physics with computers”. International Journal of Theoretical Physics 21 (6–7): 467. Bibcode 1982IJTP…21..467F.doi:10.1007/BF02650179.
 Gregg Jaeger (2006). Quantum Information: An Overview. Berlin: Springer.ISBN 0387357254. OCLC 255569451.
 Stephanie Frank Singer (2005). Linearity, Symmetry, and Prediction in the Hydrogen Atom. New York: Springer. ISBN 0387246371. OCLC 253709076.
 Giuliano Benenti (2004). Principles of Quantum Computation and Information Volume 1. New Jersey: World Scientific. ISBN 9812388303.OCLC 179950736.
 David P. DiVincenzo (2000). “The Physical Implementation of Quantum Computation”. Experimental Proposals for Quantum Computation. arXiv:quantph/0002077.
 Sam Lomonaco Four Lectures on Quantum Computing given at Oxford University in July 2006
 C. Adami, N.J. Cerf. (1998). “Quantum computation with linear optics”.arXiv:quantph/9806048v1.
 Joachim Stolze,; Dieter Suter, (2004). Quantum Computing. WileyVCH.ISBN 3527404384.
 Ian Mitchell, (1998). “Computing Power into the 21st Century: Moore’s Law and Beyond”.
 Rolf Landauer, (1961). “Irreversibility and heat generation in the computing process”.
 Gordon E. Moore (1965). Cramming more components onto integrated circuits.
 R.W. Keyes, (1988). Miniaturization of electronics and its limits.
 M. A. Nielsen,; E. Knill, ; R. Laflamme,. “Complete Quantum Teleportation By Nuclear Magnetic Resonance”.
 Lieven M.K. Vandersypen,; Constantino S. Yannoni, ; Isaac L. Chuang, (2000).Liquid state NMR Quantum Computing.
 Imai Hiroshi,; Hayashi Masahito, (2006). Quantum Computation and Information. Berlin: Springer. ISBN 3540331328.
 Andre Berthiaume, (1997). “Quantum Computation”.
 Daniel R. Simon, (1994). “On the Power of Quantum Computation”. Institute of Electrical and Electronic Engineers Computer Society Press.
 “Seminar Post Quantum Cryptology”. Chair for communication security at the RuhrUniversity Bochum.
 Laura Sanders, (2009). “First programmable quantum computer created”.
 “New trends in quantum computation”.
External links
 Stanford Encyclopedia of Philosophy: “Quantum Computing” by Amit Hagar.
 Quantiki – Wiki and portal with freecontent related to quantum information science.
 jQuantum: Java quantum circuit simulator
 QCAD: Quantum circuit emulator
 C++ Quantum Library
 QLISP Project: Quantum Programming Language
 Haskell Library for Quantum computations
 Video Lectures by David Deutsch
 Lectures at the Institut Henri Poincaré (slides and videos)
 Online lecture on An Introduction to Quantum Computing, Edward Gerjuoy (2008)
 Online Webbased Quantum Computer Simulator (University Of Patras, Wire Communications Laboratory)
 Quantum Computing research by Mikko Möttönen at Aalto University (video)
Leave a Reply