{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T06:56:38Z","timestamp":1676012198103},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener. Comput."],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s00354-012-0401-7","type":"journal-article","created":{"date-parts":[[2012,11,7]],"date-time":"2012-11-07T10:03:39Z","timestamp":1352282619000},"page":"271-296","source":"Crossref","is-referenced-by-count":6,"title":["Quantum Computation: a Tutorial"],"prefix":"10.1007","volume":"30","author":[{"given":"Beno\u00eet","family":"Valiron","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,8]]},"reference":[{"key":"401_CR1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"J.S. Bell","year":"1964","unstructured":"Bell J.S.: \u201cOn the Einstein Podolsky Rosen paradox\u201d. Physics 1, 195\u2013200 (1964)","journal-title":"Physics"},{"key":"401_CR2","unstructured":"Bennett, C. H. and Brassard, G., \u201cQuantum cryptography: Public key distribution and coin tossing,\u201d in Proc. of the IEEE Int. Conf. on Computers, Systems, and Signal Processing, pp. 175\u2013179, 1984."},{"key":"401_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","volume":"1","author":"C.H. Bennett","year":"1992","unstructured":"Bennett C.H. et\u00a0al.: \u201cExperimental quantum cryptography\u201d. J. Cryptology 5 1, 3\u201328 (1992)","journal-title":"J. Cryptology 5"},{"issue":"6","key":"401_CR4","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C.H. Bennett","year":"1995","unstructured":"Bennett C.H. et\u00a0al.: \u201cGeneralized privacy amplification\u201d. IEEE Transactions on Information Theory 41(6), 1915\u20131923 (1995)","journal-title":"IEEE Transactions on Information Theory"},{"key":"401_CR5","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1038\/nature07125","volume":"453","author":"R. Blatt","year":"2008","unstructured":"Blatt R., Wineland D.: \u201cEntangled states of trapped atomic ions\u201d. Nature 453, 1008\u20131015 (2008)","journal-title":"Nature"},{"key":"401_CR6","unstructured":"Chen, G. et\u00a0al., Quantum Computing Devices: Principles, Designs, and Analysis, Chapman and Hall\/CRC, 2007."},{"key":"401_CR7","unstructured":"D-Wave, http:\/\/www.dwavesys.com\/ , electronic resource."},{"key":"401_CR8","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1002\/1521-3978(200009)48:9\/11<771::AID-PROP771>3.0.CO;2-E","volume":"48","author":"D.P. DiVincenzo","year":"2000","unstructured":"DiVincenzo D.P.: \u201cThe physical implementation of quantum computation\u201d. Fortschr. Phys 48, 771\u2013783 (2000)","journal-title":"Fortschr. Phys"},{"key":"401_CR9","unstructured":"IDQ, http:\/\/www.idquantique.com\/ , electronic resource."},{"key":"401_CR10","unstructured":"Jordan, S., http:\/\/math.nist.gov\/quantum\/zoo\/ , electronic resource."},{"key":"401_CR11","doi-asserted-by":"crossref","unstructured":"Kaye, P., Laflamme, R., Mosca, M., An Introduction to Quantum Computing, Oxford University Press, 2007.","DOI":"10.1093\/oso\/9780198570004.001.0001"},{"issue":"4","key":"401_CR12","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1080\/00107151031000110776","volume":"44","author":"J. Kempe","year":"2003","unstructured":"Kempe J.: \u201cQuantum random walks: An introductory overview\u201d. Contemporary Physics 44(4), 307\u2013327 (2003)","journal-title":"Contemporary Physics"},{"key":"401_CR13","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1038\/35051009","volume":"409","author":"E. Knill","year":"2001","unstructured":"Knill E., Laflamme R., Milburn G.J.: \u201cA scheme for efficient quantum computation with linear optics\u201d. Nature 409, 46\u201352 (2001)","journal-title":"Nature"},{"key":"401_CR14","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1038\/nature08812","volume":"464","author":"T.D. Ladd","year":"2010","unstructured":"Ladd T.D. et\u00a0al.: \u201cQuantum computers\u201d. Nature 464, 45\u201353 (2010)","journal-title":"Nature"},{"key":"401_CR15","doi-asserted-by":"crossref","unstructured":"Lydersen, L. et\u00a0al., \u201cHacking commercial quantum cryptography systems by tailored bright illumination,\" Nature Photonics, 2010.","DOI":"10.1038\/nphoton.2010.214"},{"key":"401_CR16","unstructured":"magiQ, http:\/\/www.magiqtech.com\/MagiQ\/Home.html , electronic resource."},{"key":"401_CR17","doi-asserted-by":"crossref","first-page":"130506","DOI":"10.1103\/PhysRevLett.106.130506","volume":"106","author":"T. Monz","year":"2011","unstructured":"Monz T. et\u00a0al.: \u201c14-qubit entanglement: Creation and coherence\u201d. Phys. Rev. Lett. 106, 130506 (2011)","journal-title":"Phys. Rev. Lett."},{"key":"401_CR18","doi-asserted-by":"crossref","first-page":"170501","DOI":"10.1103\/PhysRevLett.96.170501","volume":"96","author":"C. Negrevergne","year":"2006","unstructured":"Negrevergne C. et\u00a0al.: \u201cBenchmarking quantum control methods on a 12-qubit system\u201d. Phys. Rev. Lett. 96, 170501 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"401_CR19","doi-asserted-by":"crossref","unstructured":"Nielsen, M. A. and Chuang, I. L., Quantum Computation and Quantum Information, Cambridge University Press, 2002.","DOI":"10.1119\/1.1463744"},{"key":"401_CR20","doi-asserted-by":"crossref","unstructured":"Valiron, B., \u201cQuantum computation: from a programmer\u2019s perspective,\u201d New Generation Computing, 31, 1. To appear.","DOI":"10.1007\/s00354-012-0120-0"},{"key":"401_CR21","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1038\/414883a","volume":"414","author":"L.M.K. Vandersypen","year":"2001","unstructured":"Vandersypen L.M.K. et\u00a0al.: \u201cExperimental realization of shor\u2019s quantum factoring algorithm using nuclear magnetic resonance\u201d. Nature 414, 883\u2013887 (2001)","journal-title":"Nature"}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-012-0401-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00354-012-0401-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00354-012-0401-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,30]],"date-time":"2022-01-30T23:56:15Z","timestamp":1643586975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00354-012-0401-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["401"],"URL":"https:\/\/doi.org\/10.1007\/s00354-012-0401-7","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"value":"0288-3635","type":"print"},{"value":"1882-7055","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10]]}}}