Abstract: IT security relies on the existence of efficient and secure digital signature schemes. Important applications of digital signatures are the authentication of web sites and software download...
Abstract: A remarkable feature of quantum theory is that particles with identical intrinsic properties must be treated as indistinguishable if the theory is to give valid predictions. For example, ou...
Abstract: In this talk, I will first give a brief introduction of shortcuts to adiabaticity with the applications of atom cooling, transport and internal state control. Then I focus on the shortcuts ...
Abstract: Information is physical, so the laws of physics impose the ultimate limits on the information processing. In fact, laws of quantum mechanics both limited and expanded the possibilities for ...
Abstract: We propose a method of forming quantum-size emitters within a pre-defined photonic crystal in a self-aligned fashion through controlled removal of quantum well layers via selective wet-chem...
Abstract: Ion traps are a versatile tool to study nonequilibrium statistical physics, due to the tunability of dissipation and nonlinearity.We propose an experiment with a chain of ions, where dissip...