1 | 10 | 13 | |||||||||||||||||||||||
11 | 12 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
4/8 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
1. The unauthorized interception of communication intended for other parties, a major concern in quantum cryptography.
2. The stage at which quantum computers can outperform classical computers in solving specific problems.
3. The loss of coherence or information in a quantum system occurs when it interacts with the external environment.
4. A fundamental element of quantum circuits that manipulates qubits with the purpose of executing precise operations.
5. The basic unit of quantum information, similar to classical bits but can be in a superposition of both 0 and 1 states.
6. In quantum computing, there is a phenomenon where two or more qubits establish a correlation and effortlessly share information.
7. A collection of instructions or operations designed to be executed on a quantum computer in order to solve particular problems.
8. Computing that harnesses the principles of quantum mechanics to carry out computations.
9. A quantum gate transforms a qubit from the base states to a superposition state with equal probability of different outcomes.
10. In the context of quantum computing, the fundamental concept of existing in multiple states simultaneously is observed by a qubit.
11. A method of transmitting cryptographic keys using quantum communication channels.
12. A branch of cryptography that uses principles of quantum mechanics to secure communication.
13. In quantum computing, a method is employed to safeguard against errors and decoherence that may occur throughout the computation process.