Share  Bookmark

 Download from


 Funded by

[1] Bennett, C.H. and Brassard,G. (1984) Quantum Cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984).
[2] B. Bakalov and A. Kirillov, Jr., Lectures on Tensor Categories and Modular Functors, University Lecture Series 21, Amer. Math. Soc., 2001.
[3] S. Bravyi and A. Kitaev, Universal Quantum Computation with ideal Clifford gates and noisy ancillas, Phys. Rev. A 71, 022316 (2005), arXiv:quantph/0403025.
[4] P. Bruillard, S. Ng, E. Rowell, and Z. Wang, On modular categories, in preparation.
[5] P. Etingof, D. Nikshych, and V. Ostrik, On fusion categories, Ann. of Math. (2) 162, 2 (2005), 581642, arXiv:math/0203060.
[6] M. Freedman, P/NP, and the quantum field computer, Proc. Natl. Acad. Sci. USA 95, 1 (1998), 98101.
[7] Z.G. Gu, Z. Wang, X.G. Wen, A classification of 2D fermionic and bosonic topological orders, arXiv:1010.1517.
[8] Hastings, M.B. (2009), Superadditivity of communication capacity using entangled inputs, Nature Physics 5, 255  257 (2009).
[9] M.B. Hastings, C. Nayak, and Z. Wang, Metaplectic Anyons, Majorana Zero Modes, and their Computational Power, arXiv:1210.5477.
[10] H.C. Jiang, L. Balents, and Z. Wang, Identifying topological order by entanglement entropy, Nature Physics 8, 902905(2012), doi:10.1038/nphys2465, arXiv:1205.4289.