Quantum Algorithms for Cryptographically Significant Boolean Functions: An IBMQ Experience
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Singapore
2021
Singapore Springer |
Ausgabe: | 1st ed. 2021 |
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | DE-634 DE-1043 DE-1050 DE-92 DE-898 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-19 DE-703 DE-20 DE-706 DE-824 DE-739 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (XIII, 118 p. 22 illus., 1 illus. in color) |
ISBN: | 9789811630613 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-981-16-3061-3 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV047420738 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 210816s2021 xx o|||| 00||| eng d | ||
020 | |a 9789811630613 |c Online |9 978-981-1630-61-3 | ||
024 | 7 | |a 10.1007/978-981-16-3061-3 |2 doi | |
035 | |a (ZDB-2-SMA)9789811630613 | ||
035 | |a (OCoLC)1264259801 | ||
035 | |a (DE-599)BVBBV047420738 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-91 |a DE-19 |a DE-1043 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-824 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a MAT 000 |2 stub | ||
100 | 1 | |a SAPV, Tharrmashastha |e Verfasser |4 aut | |
245 | 1 | 0 | |a Quantum Algorithms for Cryptographically Significant Boolean Functions |b An IBMQ Experience |c by Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra |
250 | |a 1st ed. 2021 | ||
264 | 1 | |a Singapore |b Springer Singapore |c 2021 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XIII, 118 p. 22 illus., 1 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science |x 2191-5768 | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Privacy | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes | |
700 | 1 | |a Bera, Debajyoti |4 aut | |
700 | 1 | |a Maitra, Arpita |4 aut | |
700 | 1 | |a Maitra, Subhamoy |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1630-60-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1630-62-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-16-3061-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SMA | ||
940 | 1 | |q ZDB-2-SMA_2021_Fremddaten | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032823341 | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-634 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-1043 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-1050 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-92 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-898 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-861 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-863 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-862 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-523 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-91 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-384 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-19 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-703 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-20 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-706 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-824 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-16-3061-3 |l DE-739 |p ZDB-2-SMA |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 919456 |
---|---|
_version_ | 1824555111818461184 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | SAPV, Tharrmashastha Bera, Debajyoti Maitra, Arpita Maitra, Subhamoy |
author_facet | SAPV, Tharrmashastha Bera, Debajyoti Maitra, Arpita Maitra, Subhamoy |
author_role | aut aut aut aut |
author_sort | SAPV, Tharrmashastha |
author_variant | t s ts d b db a m am s m sm |
building | Verbundindex |
bvnumber | BV047420738 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA |
ctrlnum | (ZDB-2-SMA)9789811630613 (OCoLC)1264259801 (DE-599)BVBBV047420738 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
doi_str_mv | 10.1007/978-981-16-3061-3 |
edition | 1st ed. 2021 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV047420738</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210816s2021 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811630613</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-1630-61-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-16-3061-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SMA)9789811630613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1264259801</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047420738</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">SAPV, Tharrmashastha</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Quantum Algorithms for Cryptographically Significant Boolean Functions</subfield><subfield code="b">An IBMQ Experience</subfield><subfield code="c">by Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Singapore</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 118 p. 22 illus., 1 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bera, Debajyoti</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maitra, Arpita</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maitra, Subhamoy</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1630-60-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1630-62-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_2021_Fremddaten</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032823341</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-16-3061-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047420738 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:56:46Z |
indexdate | 2025-02-20T07:02:28Z |
institution | BVB |
isbn | 9789811630613 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032823341 |
oclc_num | 1264259801 |
open_access_boolean | |
owner | DE-384 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1043 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-384 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1043 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XIII, 118 p. 22 illus., 1 illus. in color) |
psigel | ZDB-2-SMA ZDB-2-SMA_2021_Fremddaten |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer Singapore Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spellingShingle | SAPV, Tharrmashastha Bera, Debajyoti Maitra, Arpita Maitra, Subhamoy Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience Cryptology Mobile and Network Security Systems and Data Security Privacy Computer Crime Data encryption (Computer science) Computer networks / Security measures Computer security Computer crimes |
title | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience |
title_auth | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience |
title_exact_search | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience |
title_exact_search_txtP | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience |
title_full | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience by Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra |
title_fullStr | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience by Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra |
title_full_unstemmed | Quantum Algorithms for Cryptographically Significant Boolean Functions An IBMQ Experience by Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra |
title_short | Quantum Algorithms for Cryptographically Significant Boolean Functions |
title_sort | quantum algorithms for cryptographically significant boolean functions an ibmq experience |
title_sub | An IBMQ Experience |
topic | Cryptology Mobile and Network Security Systems and Data Security Privacy Computer Crime Data encryption (Computer science) Computer networks / Security measures Computer security Computer crimes |
topic_facet | Cryptology Mobile and Network Security Systems and Data Security Privacy Computer Crime Data encryption (Computer science) Computer networks / Security measures Computer security Computer crimes |
url | https://doi.org/10.1007/978-981-16-3061-3 |
work_keys_str_mv | AT sapvtharrmashastha quantumalgorithmsforcryptographicallysignificantbooleanfunctionsanibmqexperience AT beradebajyoti quantumalgorithmsforcryptographicallysignificantbooleanfunctionsanibmqexperience AT maitraarpita quantumalgorithmsforcryptographicallysignificantbooleanfunctionsanibmqexperience AT maitrasubhamoy quantumalgorithmsforcryptographicallysignificantbooleanfunctionsanibmqexperience |