IQIS Lecture 6.9 — Shor's algorithm
IQIS Lecture 6.8 — Simon's algorithm
IQIS Lecture 6.2 — Abstract computation and reversible computation
IQIS Lecture 7.9 — Expand, Evolve, Reduce
IQIS Lecture 6.5 — Quantum function evaluation
IQIS Lecture 6.7 — The Bernstein-Vazirani algorithm
IQIS Lecture 7.6 — Properties of Kraus representations
IQIS Lecture 7.4 — Quantum errors
IQIS Lecture 2.2 — Why qubits?
IQIS Lecture 8.5 — Nine-qubit code
IQIS Lecture 2.1 — Multi-qubit circuits
IQIS Lecture 1.4 — Ramsey interferometry via matrices and circuit diagrams
IQIS Lecture 5.3 — Two approaches to the key distribution problem
IQIS Lecture 5.6 — Security of shared randomness (continued)
IQIS Lecture 7.3 — Digitising quantum errors
IQIS Lecture 5.5 — Security of shared randomness
IQIS Lecture 7.10 — CPTP maps
IQIS Lecture 6.1 — Overview of Lecture 6
IQIS Lecture 5.8 — Comments on quantum key distribution
IQIS Lecture 7.8 — Concatenation of physically-admissible operations