Seminal Quantum Algorithms Description and Programming

Ahcene Bounceur, Mohammad Hammoudeh, Bamidele Adebisi, Mostefa Kara

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter expounds on quantum algorithms, outlining fundamental concepts and their practical implementations. It starts with an explanation of core quantum principles such as functions and oracles. Then, it introduces Qiskit, an IBM-developed open-source quantum computing software framework. The discussion integrates theoretical underpinnings with empirical demonstrations, providing readers with an understanding of quantum programming intricacies. Through the utilisation of practical examples implemented in Qiskit, readers are given firsthand exposure, thereby reinforcing their comprehension of the subject matter. The overarching objective is to equip readers with a comprehensive knowledge base, thereby fostering proficiency in navigating the theoretical underpinnings and practical applications of quantum computing. To this end, the chapter ends with an examination of three seminal quantum algorithms: Deutsch, Deutsch-Jozsa, and Bernstein-Vazirani. These algorithms serve as keystones in the quantum computing domain, illustrating the efficacy and adaptability of quantum computation in resolving diverse computational problems.

Original languageEnglish
Title of host publicationQuantum Computing
Subtitle of host publicationA Journey into the Next Frontier of Information and Communication Security
PublisherCRC Press
Pages56-75
Number of pages20
ISBN (Electronic)9781040272220
ISBN (Print)9781032757049
DOIs
StatePublished - 1 Jan 2024

Bibliographical note

Publisher Copyright:
© 2025 selection and editorial matter, Mohammad Hammoudeh, Abdullah T. Alessa, Amro M. Sher- beeni, Clinton M. Firth, and Abdullah S. Alessa; individual chapters, the contributors.

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'Seminal Quantum Algorithms Description and Programming'. Together they form a unique fingerprint.

Cite this