Modules / Lectures


Sl.No Chapter Name MP4 Download
1Quantum Algorithms and CryptographyDownload
2Basics of Quantum Information - Part 1Download
3Basics of Quantum Information - Part 2Download
4Computation and No-Cloning Part 1Download
5Computation and No-Cloning Part 2Download
6Computation and No-Cloning Part 3Download
7Going beyond classical Part 1Download
8Going beyond classical Part 2Download
9Going beyond classical Part 3Download
10Going beyond classical- Deutsch and Deutsch-Jozsa Part 1Download
11Going beyond classical- Deutsch and Deutsch-Jozsa Part 2Download
12Simon's and Bernstein's Vazirani Algorithm Part 1Download
13Simon's and Bernstein's Vazirani Algorithm part 2 Download
14Building Cryptography Part 3Download
15Building Cryptography Part 4Download
16Building Cryptography Part 5Download
17Building Public Key Encryption Part 1Download
18Building Public Key Encryption Part 2Download
19RSA Encryption Part 1Download
20RSA Encryption Part 2Download
21Finishing RSA, Fourier Transform Part 1Download
22Finishing RSA, Fourier Transform Part 2Download
23Finishing RSA, Fourier Transform Part 3Download
24Grover's Algorithm - Part 1Download
25Grover's Algorithm - Part 2Download
26Grover's Algorithm - Part 3Download
27Simon's Algorithm over Z_n - Part 1Download
28Simon's Algorithm over Z_n - Part 2Download
29Simon's Algorithm over Z_n - Part 3Download
30Simon's Algorithm over Z_n - Part 4Download
31Simon's Algorithm over Z_n - Part 5Download
32Simon's Algorithm over Z_n - Part 6Download
33Shor's Algorithm -Part 1Download
34Shor's Algorithm -Part 2Download
35Hidden Subgroup Problem - Part 1Download
36Hidden Subgroup Problem - Part 2Download
37Introduction to Lattices - Part 1Download
38Introduction to Lattices - Part 2Download
39Public Key Encryption from LWE - Part 1Download
40Public Key Encryption from LWE - Part 2Download
41Public Key Encryption from LWE - Part 3Download
42Fully Homomorphic Encryption - Part 1Download
43Fully Homomorphic Encryption - Part 2Download
44Fully Homomorphic Encryption - Part 3Download
45Quantum Cryptography Part 1Download
46Quantum Cryptography Part 2Download
47Quantum Cryptography Part 3Download
48Quantum Cryptography Part 4Download
49Quantum Cryptography Part 5Download
50Quantum PKE and FHE - Part 1Download
51Quantum PKE and FHE - Part 2Download
52Quantum PKE and FHE: Part 3Download
53Quantum PKE and FHE: Part 4Download
54Quantum PKE and FHE: Part 5Download

Sl.No Chapter Name English
1Quantum Algorithms and CryptographyDownload
Verified
2Basics of Quantum Information - Part 1Download
Verified
3Basics of Quantum Information - Part 2PDF unavailable
4Computation and No-Cloning Part 1PDF unavailable
5Computation and No-Cloning Part 2Download
Verified
6Computation and No-Cloning Part 3PDF unavailable
7Going beyond classical Part 1PDF unavailable
8Going beyond classical Part 2PDF unavailable
9Going beyond classical Part 3PDF unavailable
10Going beyond classical- Deutsch and Deutsch-Jozsa Part 1PDF unavailable
11Going beyond classical- Deutsch and Deutsch-Jozsa Part 2PDF unavailable
12Simon's and Bernstein's Vazirani Algorithm Part 1PDF unavailable
13Simon's and Bernstein's Vazirani Algorithm part 2 PDF unavailable
14Building Cryptography Part 3PDF unavailable
15Building Cryptography Part 4PDF unavailable
16Building Cryptography Part 5PDF unavailable
17Building Public Key Encryption Part 1PDF unavailable
18Building Public Key Encryption Part 2PDF unavailable
19RSA Encryption Part 1PDF unavailable
20RSA Encryption Part 2PDF unavailable
21Finishing RSA, Fourier Transform Part 1PDF unavailable
22Finishing RSA, Fourier Transform Part 2PDF unavailable
23Finishing RSA, Fourier Transform Part 3PDF unavailable
24Grover's Algorithm - Part 1PDF unavailable
25Grover's Algorithm - Part 2PDF unavailable
26Grover's Algorithm - Part 3PDF unavailable
27Simon's Algorithm over Z_n - Part 1PDF unavailable
28Simon's Algorithm over Z_n - Part 2PDF unavailable
29Simon's Algorithm over Z_n - Part 3PDF unavailable
30Simon's Algorithm over Z_n - Part 4PDF unavailable
31Simon's Algorithm over Z_n - Part 5PDF unavailable
32Simon's Algorithm over Z_n - Part 6PDF unavailable
33Shor's Algorithm -Part 1PDF unavailable
34Shor's Algorithm -Part 2PDF unavailable
35Hidden Subgroup Problem - Part 1PDF unavailable
36Hidden Subgroup Problem - Part 2PDF unavailable
37Introduction to Lattices - Part 1PDF unavailable
38Introduction to Lattices - Part 2PDF unavailable
39Public Key Encryption from LWE - Part 1PDF unavailable
40Public Key Encryption from LWE - Part 2PDF unavailable
41Public Key Encryption from LWE - Part 3PDF unavailable
42Fully Homomorphic Encryption - Part 1PDF unavailable
43Fully Homomorphic Encryption - Part 2PDF unavailable
44Fully Homomorphic Encryption - Part 3PDF unavailable
45Quantum Cryptography Part 1PDF unavailable
46Quantum Cryptography Part 2PDF unavailable
47Quantum Cryptography Part 3PDF unavailable
48Quantum Cryptography Part 4PDF unavailable
49Quantum Cryptography Part 5PDF unavailable
50Quantum PKE and FHE - Part 1PDF unavailable
51Quantum PKE and FHE - Part 2PDF unavailable
52Quantum PKE and FHE: Part 3PDF unavailable
53Quantum PKE and FHE: Part 4PDF unavailable
54Quantum PKE and FHE: Part 5PDF unavailable


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available