SlideShare a Scribd company logo
1 of 64
Download to read offline
Quantum
cryptography
Max
Braun
1.
Introduction
2.
Quantum
cryptography
3.
Quantum
mechanics
4.
Usage
Public‐key
cryptography
relies

on
P≠NP
(unproven)
and
can
be

broken
by
quantum
computers.
Ideal
quantum
cryptography
is

provably
secure
based
on

quantum
mechanics.
1.
Introduction
- History: Stephen Wiesner ca. 1970; Charles Bennett, Gilles Brassard 1984
- neglecting engineering problems
2.
Quantum
cryptography:
Vernam
cipher
Strategy
of
QC
BB84
Attacks
Alice
sends
bits
to
Bob.
Eve
is
listening.
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
XOR
=
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
secure
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
secure
truly
random
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
used
once
secure
truly
random
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Strategy
of
QC
1
0 

↕


↕


✕

✕


↕

↕
polarizations
orientations
A
photon's
polarization
prepared
in

one
orientation
and
measured
in
the

other
is
undetermined.
- later: more
general
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
keep
50%
BB84
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
25%
error
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly
no
cloning
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly use
QM
no
cloning
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Hilbert
spaces
Unitary
operators
The
no‐cloning
theorem
Measurement
Indistinguishability
of

non‐orthogonal
states
QC
Revisited
3.
Quantum
mechanics:
Hilbert
spaces
Quantum
states
are
described
by

unit
vectors
in
a
complex
vector

space
with
an
inner
product.
a
vector:
an
inner
product:
orthogonality: ψ|φ = 0
the
norm: |ψ = ψ|ψ
ψ|φ
|ψ
Hilbert
spaces
{|0 , |1 }
We
consider
the
computational
basis.
a
vector:
an
inner
product:
orthogonality:
the
norm:
|ψ = α|0 + β|1
ψ|φ = α∗
α + β∗
β
|ψ = |α|2 + |β|2
α∗
α + β∗
β = 0
->
blackboard
0|1 =
1
0
0
1
= 0
0|+ =
1
0
1√
2
1√
2
=
1
√
2
= 0
|0 = 1 · |0 + 0 · |1 |1 = 0 · |0 + 1 · |1
|+ =
|0 + |1
√
2
|− =
|0 − |1
√
2
|− =
1
√
2
2
+ −
1
√
2
2
=
1
2
+
1
2
= 1
blackboard:
examples
Hilbert
spaces
the
tensor
product:
the
natural
inner
product
here:
ψ ⊗ φ|ψ ⊗ φ = ψ|ψ φ|φ
|ψ ⊗ |φ ≡ |ψφ
->
blackboard
{|0 , |1 }
{|00 , |01 , |10 , |11 }
11|01 = 1|0 1|1 = 0 · 1 = 0
blackboard:
examples
an
operator:
its
Hermitian
adjoint:
a
unitary
operator:
Unitary
operators
U†
U = I
U†
ψ|φ = ψ|Uφ
Unitary
operators
describe
the
evolution

of
closed
quantum
systems.
= αU|ψ + βU|φ
U(α|ψ + β|φ )
->
blackboard
X|0 ≡
0 1
1 0
1
0
=
0
1
≡ |1
Y †
Y ≡
0 i∗
−i∗
0
0 −i
i 0
=
1 0
0 1
≡ I
blackboard:
examples
Unitary
operators
Unitary
operators

preserve
inner
products.
Uψ|Uφ = ψ|U†
U|φ
= ψ|I|φ = ψ|φ
The
no‐cloning
theorem
It
is
impossible
to
copy
an
arbitrary

unknown
quantum
state.
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
⇒ ψ|φ = 1 ∨ ψ|φ = 0
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
contra-
diction
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
⇒ ψ|φ = 1 ∨ ψ|φ = 0
- cloning possible if all states are equal or
orthogonal
|ψ = α|0 + β|1
measured
state
with
probability |α|2
|β|2
|0 |1
We
cannot
determine
an
arbitrary
state.
Measurement
changes
the
state.
Measurement
- for unit vectors, probabilities sum to one
Measurement
General
measurements
are
described
by

a
collection
of
measurement
operators

on
the
state
space.
{Mi}
There
is
a
probability
for
each
result.
p(i) = ψ|M†
i Mi|ψ
Measurement
The
completeness
equation
expresses

that
the
probabilities
sum
to
one.
ψ| i M†
i Mi|ψ = ψ|I|ψ = ψ|ψ = 1
⇒ i p(i) = i ψ|M†
i Mi|ψ =
i M†
i Mi = I
Indistinguishability
of

non‐orthogonal
states
There
is
no
measurement
to

distinguish
between
any
non‐
orthogonal
quantum
states.
|ψ1 |ψ2 ψ1|ψ2 = 0
Ei := f(j)=i M†
j Mj
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
|ψ2 = α|ψ1 + β|φ |β| < 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
|ψ2 = α|ψ1 + β|φ |β| < 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
⇒
√
E2|ψ2 = α
√
E2|ψ1 + β
√
E2|φ
Indistinguishability
of

non‐orthogonal
states
ψ2|E2|ψ2
Indistinguishability
of

non‐orthogonal
states
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
= |β|2
φ|φ = |β|2
< 1
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
= |β|2
φ|φ = |β|2
< 1 contra-
diction
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
QC
Revisited
1
0 

↕

↕


✕

✕


↕

↕
states
bases
A
state
prepared
in
one
basis
and

measured
in
a
non‐orthogonal
one

is
undetermined.
- remember: photons polarized in different orientations
- now: vectors in non-orthogonal bases
QC
Revisited
states
bases
0
1
{|+ , |− }{|0 , |1 }
|0
|1
|+
|−
|+ :=
|0 + |1
√
2
|− :=
|0 − |1
√
2
- draw in
2D
QC
Revisited
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
p(0|−) =
1
√
2
2
=
1
2
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
p(0|−) =
1
√
2
2
=
1
2
= −
1
√
2
2
= p(1|−)
4.
Usage
Using
optical
fiber
(USA):
148.7
km
Through
the
air
(EU):
144
km
SECOQC
- state of the art
- several companies, lots of research
- big EU project
Quantum Cryptography

More Related Content

What's hot

Machine learning (9)
Machine learning (9)Machine learning (9)
Machine learning (9)
NYversity
 
Hidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognitionHidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognition
butest
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậy
spk53
 

What's hot (14)

Gamma, Expoential, Poisson And Chi Squared Distributions
Gamma, Expoential, Poisson And Chi Squared DistributionsGamma, Expoential, Poisson And Chi Squared Distributions
Gamma, Expoential, Poisson And Chi Squared Distributions
 
Machine learning (9)
Machine learning (9)Machine learning (9)
Machine learning (9)
 
Lecture Notes: EEEC4340318 Instrumentation and Control Systems - Stability a...
Lecture Notes:  EEEC4340318 Instrumentation and Control Systems - Stability a...Lecture Notes:  EEEC4340318 Instrumentation and Control Systems - Stability a...
Lecture Notes: EEEC4340318 Instrumentation and Control Systems - Stability a...
 
Hmm
HmmHmm
Hmm
 
06. string matching
06. string matching06. string matching
06. string matching
 
Hidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognitionHidden Markov Models with applications to speech recognition
Hidden Markov Models with applications to speech recognition
 
Fourier integral
Fourier integralFourier integral
Fourier integral
 
đánh giá độ tin cậy
đánh giá độ tin cậyđánh giá độ tin cậy
đánh giá độ tin cậy
 
Lecture06
Lecture06Lecture06
Lecture06
 
Group 4 reporting c.s.
Group 4 reporting c.s.Group 4 reporting c.s.
Group 4 reporting c.s.
 
algebric solutions by newton raphson method and secant method
algebric solutions by newton raphson method and secant methodalgebric solutions by newton raphson method and secant method
algebric solutions by newton raphson method and secant method
 
Stabiltiy & R-H Ccriterion
Stabiltiy & R-H CcriterionStabiltiy & R-H Ccriterion
Stabiltiy & R-H Ccriterion
 
Limit presentation pptx
Limit presentation pptxLimit presentation pptx
Limit presentation pptx
 
Signals and systems-2
Signals and systems-2Signals and systems-2
Signals and systems-2
 

Similar to Quantum Cryptography

2 Review of Statistics. 2 Review of Statistics.
2 Review of Statistics. 2 Review of Statistics.2 Review of Statistics. 2 Review of Statistics.
2 Review of Statistics. 2 Review of Statistics.
WeihanKhor2
 
Analysis of large scale spiking networks dynamics with spatio-temporal constr...
Analysis of large scale spiking networks dynamics with spatio-temporal constr...Analysis of large scale spiking networks dynamics with spatio-temporal constr...
Analysis of large scale spiking networks dynamics with spatio-temporal constr...
Hassan Nasser
 
Probability distribution
Probability distributionProbability distribution
Probability distribution
Ranjan Kumar
 
Root locus description in lucid way by ME IITB
Root locus description in lucid way by ME IITBRoot locus description in lucid way by ME IITB
Root locus description in lucid way by ME IITB
AmreshAman
 

Similar to Quantum Cryptography (20)

Richard Everitt's slides
Richard Everitt's slidesRichard Everitt's slides
Richard Everitt's slides
 
2 Review of Statistics. 2 Review of Statistics.
2 Review of Statistics. 2 Review of Statistics.2 Review of Statistics. 2 Review of Statistics.
2 Review of Statistics. 2 Review of Statistics.
 
Module1, probablity
Module1, probablityModule1, probablity
Module1, probablity
 
The axiomatic power of Kolmogorov complexity
The axiomatic power of Kolmogorov complexity The axiomatic power of Kolmogorov complexity
The axiomatic power of Kolmogorov complexity
 
Intro to Quant Trading Strategies (Lecture 2 of 10)
Intro to Quant Trading Strategies (Lecture 2 of 10)Intro to Quant Trading Strategies (Lecture 2 of 10)
Intro to Quant Trading Strategies (Lecture 2 of 10)
 
Stat 2153 Stochastic Process and Markov chain
Stat 2153 Stochastic Process and Markov chainStat 2153 Stochastic Process and Markov chain
Stat 2153 Stochastic Process and Markov chain
 
Unit3
Unit3Unit3
Unit3
 
Analysis of large scale spiking networks dynamics with spatio-temporal constr...
Analysis of large scale spiking networks dynamics with spatio-temporal constr...Analysis of large scale spiking networks dynamics with spatio-temporal constr...
Analysis of large scale spiking networks dynamics with spatio-temporal constr...
 
Prob distros
Prob distrosProb distros
Prob distros
 
Probability distribution
Probability distributionProbability distribution
Probability distribution
 
ORMR_Monte Carlo Method.pdf
ORMR_Monte Carlo Method.pdfORMR_Monte Carlo Method.pdf
ORMR_Monte Carlo Method.pdf
 
QTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature MapQTML2021 UAP Quantum Feature Map
QTML2021 UAP Quantum Feature Map
 
Root locus description in lucid way by ME IITB
Root locus description in lucid way by ME IITBRoot locus description in lucid way by ME IITB
Root locus description in lucid way by ME IITB
 
Statistical computing2
Statistical computing2Statistical computing2
Statistical computing2
 
PTSP PPT.pdf
PTSP PPT.pdfPTSP PPT.pdf
PTSP PPT.pdf
 
Montecarlophd
MontecarlophdMontecarlophd
Montecarlophd
 
PhysicsSIG2008-01-Seneviratne
PhysicsSIG2008-01-SeneviratnePhysicsSIG2008-01-Seneviratne
PhysicsSIG2008-01-Seneviratne
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.ppt
 
Book chapter-5
Book chapter-5Book chapter-5
Book chapter-5
 
A new class of restricted quantum membrane systems
A new class of restricted quantum membrane systemsA new class of restricted quantum membrane systems
A new class of restricted quantum membrane systems
 

Recently uploaded

Electricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 studentsElectricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 students
levieagacer
 
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPTHIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPT

Recently uploaded (20)

FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdfFORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
 
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center ChimneyX-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
X-rays from a Central “Exhaust Vent” of the Galactic Center Chimney
 
Electricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 studentsElectricity and Circuits for Grade 9 students
Electricity and Circuits for Grade 9 students
 
GBSN - Microbiology (Unit 5) Concept of isolation
GBSN - Microbiology (Unit 5) Concept of isolationGBSN - Microbiology (Unit 5) Concept of isolation
GBSN - Microbiology (Unit 5) Concept of isolation
 
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
 
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
Harry Coumnas Thinks That Human Teleportation is Possible in Quantum Mechanic...
 
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxSaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
 
MSCII_ FCT UNIT 5 TOXICOLOGY.pdf
MSCII_              FCT UNIT 5 TOXICOLOGY.pdfMSCII_              FCT UNIT 5 TOXICOLOGY.pdf
MSCII_ FCT UNIT 5 TOXICOLOGY.pdf
 
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
dkNET Webinar: The 4DN Data Portal - Data, Resources and Tools to Help Elucid...
 
NuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdfNuGOweek 2024 programme final FLYER short.pdf
NuGOweek 2024 programme final FLYER short.pdf
 
Vital Signs of Animals Presentation By Aftab Ahmed Rahimoon
Vital Signs of Animals Presentation By Aftab Ahmed RahimoonVital Signs of Animals Presentation By Aftab Ahmed Rahimoon
Vital Signs of Animals Presentation By Aftab Ahmed Rahimoon
 
Technical english Technical english.pptx
Technical english Technical english.pptxTechnical english Technical english.pptx
Technical english Technical english.pptx
 
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPTHIV AND INFULENZA VIRUS PPT HIV PPT  INFULENZA VIRUS PPT
HIV AND INFULENZA VIRUS PPT HIV PPT INFULENZA VIRUS PPT
 
ANATOMY OF DICOT AND MONOCOT LEAVES.pptx
ANATOMY OF DICOT AND MONOCOT LEAVES.pptxANATOMY OF DICOT AND MONOCOT LEAVES.pptx
ANATOMY OF DICOT AND MONOCOT LEAVES.pptx
 
Taphonomy and Quality of the Fossil Record
Taphonomy and Quality of the  Fossil RecordTaphonomy and Quality of the  Fossil Record
Taphonomy and Quality of the Fossil Record
 
A Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert EinsteinA Scientific PowerPoint on Albert Einstein
A Scientific PowerPoint on Albert Einstein
 
Factor Causing low production and physiology of mamary Gland
Factor Causing low production and physiology of mamary GlandFactor Causing low production and physiology of mamary Gland
Factor Causing low production and physiology of mamary Gland
 
Film Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdfFilm Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdf
 
Information science research with large language models: between science and ...
Information science research with large language models: between science and ...Information science research with large language models: between science and ...
Information science research with large language models: between science and ...
 
PARENTAL CARE IN FISHES.pptx for 5th sem
PARENTAL CARE IN FISHES.pptx for 5th semPARENTAL CARE IN FISHES.pptx for 5th sem
PARENTAL CARE IN FISHES.pptx for 5th sem
 

Quantum Cryptography