Here is a list of all classical and quantum codes that have been realized in experimental or real-world devices.
Name Realization(s)
120-cell code Improved proofs of the Bell-Kochen-Specker (BKS) theorem [1].
600-cell code Improved proofs of the Bell-Kochen-Specker (BKS) theorem [2].
Alamouti code Wireless standards since: 3G, LTE, LTE-Advanced, and 5G.WiFi standards: 802.11n, 802.11ad, 802.11ay, etc.
Analog stabilizer code One-sided device-independent QKD [3].
BPSK c-q code Linear-optical quantum receiver [4].Homodyne receiver [5].Kennedy receiver [5][6].Photon-number resolving detector [7].Communication over dephasing [8], time-varying phase-noise [9], and thermal-noise [10] channels.
Bacon-Shor code Trapped-ion qubits: state preparation, logical measurement, and stabilizer measurement for nine-qubit Bacon-Shor code demonstrated on a 13-qubit device by M. Cetina and C. Monroe groups [11].
Balanced code Balanced length-eight code, known as a 6b/8b encoding, used for balancing direct current in a communications system [12]
Binary BCH code Satellite communication [13]
Binary PSK (BPSK) code Telephone-line modems throughout 1950s and 1960s: Bell 103 and 202, as well as international standards V.21 [14] and V.23 [15].
Binomial code Microwave cavities coupled to superconducting circuits: state transfer between a binomial codeword to another system [16], error-correction protocol nearly reaching break-even [17], and a teleported CNOT gate [18]. A realization of the "0-2-4" encoding is the first to go beyond break-even error-correction and yields a logical lifetime that exceeds the cavity lifetime by \(16\%\) [19] (see also [20]).
Bose–Chaudhuri–Hocquenghem (BCH) code DVDs, disk drives, and two-dimensional bar codes [21].
Calderbank-Shor-Steane (CSS) stabilizer code Fully homomorphic encryption [22].Entanglement purification protocols related to quantum key distribution (QKD) [23].Cryptographic applications stemming from the monogamy of entanglement of CSS code and error words [24].
Cat code Four-legged (\(S=1\)) cat code has been realized in a superconducting circuit device [25]. This paper is the first to reach break-even error-correction, where the lifetime of a logical qubit is on par with the cavity lifetime.
Classical Goppa code Initial version of the McEliece public-key cryptosystem [26][27] and its variation by Niederreiter [28] where the generator matrix is replaced by the parity check matrix. Some of these were proven to be insecure since the public key exposes algebraic structure of code [29].
Coherent FSK (CFSK) c-q code Time-resolving quantum receiver [30].Bondurant receiver [31].Bayesian inference [32].
Constant-weight code Radio-network frequency hopping [33].
Convolutional code A type of convolutional code used in Real-time Application networks [34].Mobile and radio communications (3G networks) use convolutional codes concatenated with Reed-Solomon codes to obtain suitable performance [35].A convolutional code with rate 1/2 was used for deep-space and satellite communication [36]
Covering code Data compression both with or without compression [37].Football-pool problem: finding the smallest number of bets on a set of matches needed to guarantee at least one bet has at most \(\rho\) errors [38][39].
Dual-rail quantum code The dual-rail code is ubiquitous in linear optical quantum devices [40].
Fibonacci string-net code NMR: Implementation of braiding-based Hamamard gate on two qubits [41].
Five-qubit perfect code NMR: Implementation of perfect error correcting code on 5 spin subsystem of labeled crotonic acid for quantum network benchmarking [42]. Single-qubit logical gates [43].Superconducting qubits [44].Trapped-ion qubits: non-transversal CNOT gate between two logical qubits, including rounds of correction and fault-tolerant primitives such as flag qubits and pieceable fault tolerance, on a 12-qubit device by Quantinuum [45].Nitrogen-vacancy centers in diamond: fault-tolerant single-qubit Clifford operations [46].
Floquet color code Plaquette stabilizer measurement realized on the IBM Falcon superconducting-qubit device [47]
Fountain code Designed for servers sending data to many recipients, such as during broadcasting or file distribution [48][49].
Gabidulin code Public-key cryptosystems [50][51].Digital watermarking. The Gabidulin code provides efficient correction against luminance tampering and image-slicing distortion due to the consistency of the rank against alterations such as column swapping [52].
Generalized RS (GRS) code Commonly used in mass storage systems such as CDs, DVDs, QR codes etc.Various cloud storage systems [53].Public-key cryptosystems generalizing those that used Goppa codes [26][27][28], some of which were proven to be insecure [29]. More recent works focus on methods to mask the algebraic structure using subcodes of GRS codes [50]. For example, a key-recovery attack was developed in Ref. [54] for a variant of masking method proposed in Ref. [55].
Golay code Extended Golay code used in the Voyager 1 and 2 spacecraft, transmitting hundreds of color pictures of Jupiter and Saturn in their 1979, 1980, and 1981 fly-bys [56].Extended Golay code used in American military standards for automatic link establishment in high frequency radio systems [57].Proofs of the quantum mechanical Kochen-Specker theorem [58].
Gold code Used in for synchronization purposes in telecommunication [59]GPS C/A for satellite navigation [60].
Gottesman-Kitaev-Preskill (GKP) code Motional degree of freedom of a trapped ion: GKP encoding realized with the help of post-selection [61][62], followed by realization of reduced form of GKP error correction, where displacement error syndromes are measured to one bit of precision using an ion electronic state [63].Microwave cavity coupled to superconducting circuits: reduced form of GKP error correction, where displacement error syndromes are measured to one bit of precision using an ancillary transmon [64]. Subsequent paper [20] uses reinforcement learning for error-correction cycle design and is the first to go beyond break-even error-correction, with the lifetime of a logical qubit exceeding the cavity lifetime by about a factor of two (see also [19]).Single-qubit \(Z\)-gate has been demonstrated in the single-photon subspace of an infinite-mode space [65], in which time and frequency become bosonic conjugate variables of a single effective bosonic mode.In signal processing, GKP state position-state wavefunctions are related to Dirac combs [66].
Gray code Three-dimensional imaging [67].Broadcasting and communication [68].
Group GKP code Cryptographic applications stemming from the monogamy of entanglement of group GKP code and error words [3].
Hamming code Commonly used when error rates are very low, for example, computer RAM or integrated circuits [69].Hamming-code based matrix embedding used in steganography [70][71].
Heavy-hexagon code Logical state preparation and flag-qubit error correction realized in superconducting-circuit devices (specifically, fixed-frequency transmon qubit architectures) by IBM for \(d=2\) [72][73] and \(d=3\) [74].
Hessian polyhedron code Quantum mechanical SIC-POVMs [75].
Hexagonal GKP code Microwave cavity coupled to superconducting circuits: reduced form of GKP error correction, where displacement error syndromes are measured to one bit of precision using an ancillary transmon [64].
Honeycomb Floquet code Plaquette stabilizer measurement realized on the IBM Falcon superconducting-qubit device [47]
Interleaved RS (IRS) code The cross-interleaved RS (CIRC), an IRS code using two shortened RS codes and two forms of interleaving, was used for compact discs (CDs) [76] (see Ref. [77], Sec. 5.6 and Ref. [78], Ch. 4).
Justesen code Generating small-bias sample spaces, i.e., probability distributions that parity functions cannot typically distinguish from the uniform distribution [79].
Kitaev surface code One cycle of syndrome readout on 19-qubit planar and 24-qubit toric codes realized in two-dimensional Rydberg atomic arrays [80]. Signatures of corresponding topological phase of matter detected in superconducting circuits [81] and two-dimensional Rydberg atomic arrays [82].
Lloyd-Slotine nine-mode code Optical network by the Furusawa group [83].
Locally recoverable code (LRC) An \((18,14,7)\) LRC code has beed used in the Windows Azure cloud storage system [84]; see also Sec. 31.3.1.2 in Ref. [85].
Low-density parity-check (LDPC) code 5G NR cellular communication for the traffic channel [86].WiMAX (IEEE 802.16e) [87].Satellite transmission of digital television [88].Quantum key distribution [89].
Low-rank parity-check (LRPC) code Cryptosystem [90] that is a rank-metric analogue of NTRU [91] and MDPC [92] cryptosystems.Post-quantum cryptography [93].
Matching code Braiding of defects has been demonstrated for a five-qubit version of code [94].
Maximum distance separable (MDS) code The McEliece Public Key Cryptosystem [95] uses algebraic coding theory to secure communications against eavesdropping attack, in which private keys are generator matrices of linear codes, i.e., \(G\). Public Keys shared to outside world are scrambled and permutated versions of \(G\), i.e., \(G^\prime=SGP\). Data to be encrypted, \(u\), is multiplied by public key and added intentional errors \(e\), i.e., \(x=uG^\prime+e\). Upon receiving encrypted data, private key owner can apply inverse permutation \(P^{-1}\) to \(x\), decode the scrambled message given the presence of \(e\) errors, and finally unscramble to obtain \(u\). Security parameters of the system are \(n\) and \(e\), hence MDS codes, such as GRS codes may provide the same security level for shorter key sizes, and the private key owner can decode arguably fast enough using known decoding algorithms.Automatic repeat request (ARQ) data transmission protocols ([78], Ch. 7).
Maximum-rank distance (MRD) code Useful for error and erasure correction in network coding [96][97].
Monitored random-circuit code Measurement induced quantum phases have been realized in a trapped-ion processor [98].
Multi-mode GKP code Multimode GKP states are similar to the lattice Gaussian states featured in the proof of hardness of LWE [99; pg. 12].
Niset-Andersen-Cerf code Realized in Ref. [100] in an optical system with 3 beam-splitters. The fidelity peaked around \(0.6\) for deterministic approach, and around \(0.77\) for the probabilistic approach (with a 25% chance of error).
On-off keyed (OOK) c-q code Proof-of-principle experiments using Dolinar [101] and TES receivers [102].
One-hot code The bi-quinary code, a combination of one-hot 1-in-2 and 1-in-5 one-hot codes to encode decimal digits, was used in several early computers ([103], Ch. 27).Marking the state of a finite automaton [104].Used in machine-learning based classification tasks because one-hot encodings, as opposed to integer encodings, do not presume an order [105].
PPM c-q code Conditional pulse nulling (CPN) receiver [106].
PSK c-q code Multi-stage quantum receivers [107][108][109][110].Bayesian inference [111].
Pair-cat code Microwave cavities coupled to superconducting circuits by the Wang group [112].
Phase-shift keyring (PSK) code Telephone-line modems: 1967 Milgo 4400/48 and international standard V.27 used 8-PSK [113].
Polar code Code control channels for the 5G NR (New Radio) interfaces [114].
Pulse-position modulation (PPM) code Greek hydraulic semaphore system [115][116].Telegraph time-division multiplexing.Radio-control, fiber-optic communications, and deep-space communications.
Quadrature PSK (QPSK) code Japanese and North American digital cellular and personal systems [117].Telephone-line modems: 1962 Bell 201 and international standard V.24 [118].
Quadrature-amplitude modulation (QAM) code Optical communication (e.g., Ref. [119]).Telephone-line modems: 1971 Codex 9600C and international standard V.29 used 16-QAM [120].
Quantum Tanner code Used to obtain explicit lower bounds in the sum-of-squares game [121].States that, on average, achieve small violations of check operators for quantum Tanner codes require a circuit of non-constant depth to make. They are used in the proof [122] of the No low-energy trivial states (NLTS) conjecture [123].
Quantum parity code (QPC) The \([[m^2,1,m]]\) codes for \(m\leq 7\) have been realized in trapped-ion quantum devices [124].
Quantum repetition code NMR: 3-qubit phase-flip code [125][126], with up to two rounds of error correction in liquid-state NMR [127].Superconducting circuits: 3-qubit phase-flip and bit-flip code by Schoelkopf group [128]; 3-qubit bit-flip code [129]; 3-qubit phase-flip code up to 3 cycles of error correction [130]; IBM 15-qubit device [131]; IBM Rochester device using 43-qubit code [132]; Google system performing up to 8 error-correction cycles on 5 and 9 qubits [133]; Google Quantum AI Sycamore utilizing up to 11 physical qubits and running 50 correction rounds [134]; Google Quantum AI Sycamore utilizing up to 25 qubits for comparison of logical error scaling with a quantum code [135] (see also [136]).Continuous error correction protocols have been implemented on a 3-qubit superconducting qubit device [137].Semiconductor spin-qubit devices: 3-qubit devices at RIKEN [138] and Delft [139].Nitrogen-vacancy centers in diamond: 3-qubit phase-flip code [140][141] (see also Ref. [142]).Trapped-ion device: 3-qubit phase-flip algorithm implemented in 3 cycles on high fidelity gate operations [143].
Random code Distributed storage systems [144].Classical and quantum cryptography based on the learning-with-errors problem, which is related to decoding a random linear code [99].
Rank-metric code Identity-Based Encryption [145].Digital watermarking [146].Network coding and streaming media broadcasting [147].
Rank-modulation Gray code (RMGC) Electronic devices where charges can either increase in an individual cell or decrease in a block of adjacent cells, e.g., flash memories [148].
Raptor (RAPid TORnado) code Two versions of Raptor codes have been standardized by IETF: R10 and the more recent RaptorQ. RaptorQ is used in mobile multimedia broadcasts as specified in ETSI technical specifications. It is also used in the mobile Next Gen TV standard.Raptor codes are useful in scenarios where erasure (i.e. weak signal or noisy channel) is common, such as in military or disaster scenarios.
Reed-Muller (RM) code Deep-space communication [149][150]. For example, the \((32, 6, 16)\) RM code was used for the Mariner 9 spacecraft.
Reed-Solomon (RS) code RS Product Code (RSPC) was used in DVDs (see Ref. [78], Ch. 4).DSL technologies and their variants against impluse noise [151].Cryptographic primitives based on the hardness of decoding RS codes for more than \(1-\sqrt{k/n}+\epsilon\) errors. This is equivalent to the polynomial reconstruction problem [152].RS codes as outer codes concatenated with convolutional codes are used indirectly in space exploration programs such as Voyager and Galileo. RS codes were part of a temetry channel coding standard issued by the Consultative Committee for Space Data Systems (see Ref. [78], Ch. 3).The ubiquity of RS codes has yielded off-the-shelf VLSI intergrated-circuit decoding hardware [153] (see also Ref. [78], Ch. 5 and 10).Automatic repeat request (ARQ) data transmission protocols (see Ref. [78], Ch. 7).Slow-frequency-hop spread-spectrum transmission (see Ref. [78], Chs. 8-9).Coded sharding designs in blockchains to increase efficiency [154].Private Information Retrieval [155].Used in QR-Codes to retrieve damaged barcodes [156].Wireless communication systems such as 3G, DVB, and WiMAX [157].Correcting pooled testing results for SARS-CoV-2 [158].
Repetition code Repetition codes, in conjunction with other codes, were used in magnetic disks [159].
Residue AG code Improvements over the McEliece public-key cryptosystem to linear AG codes on curves of arbitrary genus [160]. Only the subfield subcode proposal remains resilient to attacks ([85], Sec. 15.7.5.3).Algebraic secret-sharing schemes [161].
Single parity-check (SPC) code Can be realized on almost every communication device. SPCs are some of the earliest error-correcting codes ([103], Ch. 27).
Skew-cyclic code Not directly implemented, but BCH codes form a subclass, and are used in DVD, solid state drive storage, etc.
Spacetime block code (STBC) High data-rate wireless communication, e.g., WiMAX (IEEE 802.16m) [162][163][164].
Surface-17 code Implemented at ETH Zurich by the Wallraff group [165] and on the Zuchongzhi 2.1 superconducting quantum processor [166]. Both experimental error rates are above the pseudothreshold for this code relative to a single qubit. See Physics viewpoint for a summary [167].
Tensor-product code Construction can be used in magnetic recording by taking the tensor product of a Reed-Solomon code and a parity-check code [168].
Ternary Golay Code Code used in football pools with at least one good bet [169][39]. In fact, the code was originally constructed by Juhani Virtakallio and published in the Finnish football pool magazine Veikkaaja [39][170].Proofs of the quantum mechanical Kochen-Specker theorem [58].
Two-component cat code Lindbladian-based [171][172] and Hamiltonian-based 'Kerr-cat' [173] encodings have been achieved in superconducting circuit devices by the Devoret group; Ref. [172] also demonstrated a displacement-based gate. The Lindbladian-based scheme has further achieved a suppression of bit-flip errors that is exponential in the average photon number [174] up to a bit-flip time of 1ms. A bit-flip time of 1s has been achieved in a similar system in the classical bit regime [175].T4C code realized in a superconducting circuit device by the Wang group [176].
Weight-two code Two-in-five, also known as the two-out-of-five code, was used in the United States Postal Service's POSTNET barcode system as well as the Postal Alpha-numeric Encoding Technique (PLANET).Two-in-five code forms the numerical part of the Code 39 barcode encoding.Two-in-five code was used on early IBM computers [177][170].
XZZX surface code Distance-five 25-qubit code implemented on a superconducting quantum processor by Google Quantum AI [135]. This code outperformed the average of several instances of the smaller distance-three 9-qubit \(XZZX\) variant of the surface-17 code realized on the same device, both in terms of logical error probability over 25 cycles and in terms of logical error per cycle. This increase in error-correcting capabilities while using more physical qubits supports the notion of an error threshold. Braiding of defects has been demonstrated for the distance-five code [178]. Leakage errors have been handled in a separate work in a distance-three code [136].
Zetterberg code Code used to provide better protection of data transmission with its double error correcting capacity [179].
\(A_2\) hexagonal lattice code Wireless communication [180][181].
\([[2m,2m-2,2]]\) error-detecting code Trapped-ion devices: 12-qubit device by Quantinuum [182].
\([[4,2,2]]\) CSS code \([[4,1,2]]\) subcode implemented using four-qubit graph state of photons [183]. Trapped-ion device by IonQ [184].Logical state preparation and flag-qubit error correction realized in superconducting-circuit devices by IBM [72][73].The subcode \(\{|\overline{00}\rangle,|\overline{10}\rangle\}\) [185] and \(\{|\overline{00}\rangle,|\overline{01}\rangle\}\) [134], treated as a planar surface code, has been realized in superconducting-circuit devices.Logical gates between two copies of the subcode \(\{|\overline{10}\rangle,|\overline{11}\rangle\}\), interpreted as lattice surgery between planar surface codes, realized in superconducting circuits [186].Logical gates for the \(\{|\overline{00}\rangle,|\overline{11}\rangle\}\) subcode, treated as a planar code, realized in superconducting circuits [187].
\([[7,1,3]]\) Steane code Trapped-ion qubits: seven-qubit device in Blatt group [188], ten-qubit QCCD device by Quantinuum [189] (see APS Physics Synopsys [190]). Fault-tolerant universal two-qubit gate set by Monz group [191]. Logical CNOT gate between two logical qubits, including rounds of correction and fault-tolerant primitives such as flag qubits and pieceable fault tolerance, on a 20-qubit device by Quantinuum [45]; logical fidelity interval of the combined preparation-CNOT-measurement procedure was higher than that of the unencoded physical qubits.Rydberg atom arrays: Lukin group [80].
\([[9,1,3]]\) Shor code Trapped-ion qubits: state preparation with 98.8(1)% and 98.5(1)% fidelity for state \(|\overline{0}\rangle\) and \(|\overline{1}\rangle\), respectively, by N. Linke group [124]. Variants of the code to handle coherent noise studied and realized by K. Brown and C. Monroe groups [192].Optical systems: quantum teleportation of information implemented by J.-W. Pan group on maximally entangled pair of one physical and one logical qubit with fidelity rate of up to 78.6% [193]. All-photonic quantum repeater architecture tested on the same code [194].

References

[1]
M. Waegell and P. K. Aravind, “Parity Proofs of the Kochen–Specker Theorem Based on the 120-Cell”, Foundations of Physics 44, 1085 (2014). DOI; 1309.7530
[2]
M. Waegell and P. K. Aravind, “Critical noncolorings of the 600-cell proving the Bell–Kochen–Specker theorem”, Journal of Physics A: Mathematical and Theoretical 43, 105304 (2010). DOI; 0911.2289
[3]
Eric Culf, Thomas Vidick, and Victor V. Albert, “Group coset monogamy games and an application to device-independent continuous-variable QKD”. 2212.03935
[4]
K. Tsujino et al., “Quantum Receiver beyond the Standard Quantum Limit of Coherent Optical Communication”, Physical Review Letters 106, (2011). DOI; 1103.5592
[5]
C. Wittmann et al., “Demonstration of Near-Optimal Discrimination of Optical Coherent States”, Physical Review Letters 101, (2008). DOI; 0809.4953
[6]
M. L. Shcherbatenko et al., “Sub-shot-noise-limited fiber-optic quantum receiver”, Physical Review A 101, (2020). DOI; 1911.08932
[7]
M. T. DiMario and F. E. Becerra, “Robust Measurement for the Discrimination of Binary Coherent States”, Physical Review Letters 121, (2018). DOI; 1807.05199
[8]
M. T. DiMario et al., “Optimized communication strategies with binary coherent states over phase noise channels”, npj Quantum Information 5, (2019). DOI; 1907.12515
[9]
M. T. DiMario and F. E. Becerra, “Phase tracking for sub-shot-noise-limited receivers”, Physical Review Research 2, (2020). DOI
[10]
Renzhi Yuan et al., “Optimally Displaced Threshold Detection for Discriminating Binary Coherent States Using Imperfect Devices”. 2007.11109
[11]
Laird Egan et al., “Fault-Tolerant Operation of a Quantum Error-Correction Code”. 2009.11482
[12]
K. A. S. Immink. Codes for mass data storage systems. Shannon Foundation Publisher, 2004.
[13]
Cheung, K-M., and F. Pollara. "Phobos lander coding system: Software and analysis." The Telecommunications and Data Acquisition Report (1988).
[14]
International Telecommunication Union-T, Recommendation V.21: 300 bits per second duplex modem standardized for use in the general switched telephone network, 1984
[15]
International Telecommunication Union-T, Recommendation V.23: 600/1200-baud modem standardized for use in the general switched telephone network, 1988
[16]
C. J. Axline et al., “On-demand quantum state transfer and entanglement between remote microwave cavity memories”, Nature Physics 14, 705 (2018). DOI; 1712.05832
[17]
L. Hu et al., “Quantum error correction and universal gate set operation on a binomial bosonic logical qubit”, Nature Physics 15, 503 (2019). DOI; 1805.09072
[18]
Y. Xu et al., “Demonstration of Controlled-Phase Gates between Two Error-Correctable Photonic Qubits”, Physical Review Letters 124, (2020). DOI; 1810.04690
[19]
Zhongchu Ni et al., “Beating the break-even point with a discrete-variable-encoded logical qubit”. 2211.09319
[20]
V. V. Sivak et al., “Real-time quantum error correction beyond break-even”. 2211.09116
[21]
S. Zhu, Z. Sun, and X. Kai, “A Class of Narrow-Sense BCH Codes”, IEEE Transactions on Information Theory 65, 4699 (2019). DOI
[22]
G. Alagic et al., “Quantum Fully Homomorphic Encryption with Verification”, Advances in Cryptology – ASIACRYPT 2017 438 (2017). DOI; 1708.09156
[23]
P. W. Shor and J. Preskill, “Simple Proof of Security of the BB84 Quantum Key Distribution Protocol”, Physical Review Letters 85, 441 (2000). DOI; quant-ph/0003004
[24]
Andrea Coladangelo et al., “Hidden Cosets and Applications to Unclonable Cryptography”. 2107.05692
[25]
Nissim Ofek et al., “Demonstrating Quantum Error Correction that Extends the Lifetime of Quantum Information”. 1602.04768
[26]
R. J. McEliece, A public-key cryptosystem based on algebraic coding theory, Technical report, Jet Propulsion Lab. DSN Progress Report (1978).
[27]
H. Janwa and O. Moreno, “McEliece public key cryptosystems using algebraic-geometric codes”, Designs, Codes and Cryptography 8, (1996). DOI
[28]
H. Niederreiter (1986). Knapsack-type cryptosystems and algebraic coding theory. Problems of Control and Information Theory. Problemy Upravlenija I Teorii Informacii. 15: 159–166.
[29]
V. M. SIDELNIKOV and S. O. SHESTAKOV, “On insecurity of cryptosystems based on generalized Reed-Solomon codes”, Discrete Mathematics and Applications 2, (1992). DOI
[30]
M. V. Jabir et al., “Energy and bandwidth efficiency optimization of quantum-enabled optical communication channels”, npj Quantum Information 8, (2022). DOI
[31]
M. V. Jabir et al., “Experimental demonstration of the near-quantum optimal receiver”, OSA Continuum 3, 3324 (2020). DOI
[32]
I. A. Burenkov et al., “Time-Resolving Quantum Measurement Enables Energy-Efficient, Large-Alphabet Communication”, PRX Quantum 1, (2020). DOI
[33]
D. H. Smith, L. A. Hughes, and S. Perkins, “A New Table of Constant Weight Codes of Length Greater than 28”, The Electronic Journal of Combinatorics 13, (2006). DOI
[34]
S. I. Mrutu, A. Sam, and N. H. Mvungi, “Forward Error Correction Convolutional Codes for RTAs' Networks: An Overview”, International Journal of Computer Network and Information Security 6, 19 (2014). DOI
[35]
T. Halonen, J. Romero, and J. Melero, editors , GSM, GPRS and EDGE Performance (Wiley, 2003). DOI
[36]
Butman, Deutsch, and Miller. Performance of concatenated codes for deep space missions. 1981.
[37]
G. Cohen, I. Honkala, S. Litsyn, A. Lobstein, Covering Codes, Elsevier (1997).
[38]
H. Hamalainen et al., “Football Pools--A Game for Mathematicians”, The American Mathematical Monthly 102, 579 (1995). DOI
[39]
A. Barg, “At the Dawn of the Theory of Codes”, The Mathematical Intelligencer 15, 20 (1993). DOI
[40]
P. Kok et al., “Linear optical quantum computing with photonic qubits”, Reviews of Modern Physics 79, 135 (2007). DOI; quant-ph/0512071
[41]
Yu-ang Fan et al., “Experimental realization of a topologically protected Hadamard gate via braiding Fibonacci anyons”. 2210.12145
[42]
E. Knill et al., “Benchmarking Quantum Computers: The Five-Qubit Error Correcting Code”, Physical Review Letters 86, 5811 (2001). DOI; quant-ph/0101034
[43]
J. Zhang, R. Laflamme, and D. Suter, “Experimental Implementation of Encoded Logical Qubit Operations in a Perfect Quantum Error Correcting Code”, Physical Review Letters 109, (2012). DOI; 1208.4797
[44]
M. Gong et al., “Experimental exploration of five-qubit quantum error-correcting code with superconducting qubits”, National Science Review 9, (2021). DOI; 1907.04507
[45]
C. Ryan-Anderson et al., “Implementing Fault-tolerant Entangling Gates on the Five-qubit Code and the Color Code”. 2208.01863
[46]
M. H. Abobeih et al., “Fault-tolerant operation of a logical qubit in a diamond quantum processor”, Nature 606, 884 (2022). DOI; 2108.01646
[47]
James R. Wootton, “Measurements of Floquet code plaquette stabilizers”. 2210.13154
[48]
A. Shokrollahi, “Raptor codes”, IEEE Transactions on Information Theory 52, 2551 (2006). DOI
[49]
E. Baik, A. Pande, and P. Mohapatra, “Cross-layer coordination for efficient contents delivery in LTE eMBMS traffic”, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012) (2012). DOI
[50]
T. P. Berger and P. Loidreau, “How to Mask the Structure of Codes for a Cryptographic Use”, Designs, Codes and Cryptography 35, 63 (2005). DOI
[51]
T. Lau and C. Tan, “A New Technique in Rank Metric Code-Based Encryption”, Cryptography 2, 32 (2018). DOI
[52]
P. Lefevre, P. Carre, and P. Gaborit, “Watermarking and Rank Metric Codes”, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2018). DOI
[53]
H. Dau et al., “Repairing Reed-Solomon Codes With Multiple Erasures”, IEEE Transactions on Information Theory 64, 6567 (2018). DOI; 1612.01361
[54]
Alain Couvreur et al., “Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes”. 1307.6458
[55]
Marco Baldi et al., “Enhanced public key security for the McEliece cryptosystem”. 1108.2462
[56]
E. C. Stone, “The Voyager 2 encounter with Uranus”, Journal of Geophysical Research: Space Physics 92, 14873 (1987). DOI
[57]
E. E. Johnson. An Efficient Golay Codec For MIL-STD-188-141A and FED-STD-1045. Department of Electrical and Computer Engineering, New Mexico State University, 1991.
[58]
Mordecai Waegell and P. K. Aravind, “The Golay codes and Quantum Contextuality”. 2206.04209
[59]
Mujtaba Hamid and Andy Miller, Gold Code Generators in Virtex Devices, (2000)
[60]
J. J. SPILKER Jr., “GPS Signal Structure and Performance Characteristics”, Navigation 25, 121 (1978). DOI
[61]
C. Flühmann et al., “Encoding a qubit in a trapped-ion mechanical oscillator”, Nature 566, 513 (2019). DOI; 1807.01033
[62]
C. Flühmann and J. P. Home, “Direct Characteristic-Function Tomography of Quantum States of the Trapped-Ion Motional Oscillator”, Physical Review Letters 125, (2020). DOI; 1907.06478
[63]
Brennan de Neeve et al., “Error correction of a logical grid state qubit by dissipative pumping”. 2010.09681
[64]
P. Campagne-Ibarcq et al., “Quantum error correction of a qubit encoded in grid states of an oscillator”, Nature 584, 368 (2020). DOI; 1907.12487
[65]
N. Fabre et al., “Generation of a time-frequency grid state with integrated biphoton frequency combs”, Physical Review A 102, (2020). DOI; 1904.01351
[66]
H. G. Feichtinger and T. Strohmer, editors , Gabor Analysis and Algorithms (Birkhäuser Boston, 1998). DOI
[67]
G. Sansoni et al., “Three-dimensional imaging based on Gray-code light projection: characterization of the measuring algorithm and development of a measuring system for industrial applications”, Applied Optics 36, 4463 (1997). DOI
[68]
S. L. Johnsson and C.-T. Ho, “Optimum broadcasting and personalized communication in hypercubes”, IEEE Transactions on Computers 38, 1249 (1989). DOI
[69]
R. Hentschke et al., “Analyzing area and performance penalty of protecting different digital modules with Hamming code and triple modular redundancy”, Proceedings. 15th Symposium on Integrated Circuits and Systems Design. DOI
[70]
Crandall, Ron. "Some notes on steganography." Posted on steganography mailing list 1998 (1998): 1-6.
[71]
A. Westfeld, “F5—A Steganographic Algorithm”, Information Hiding 289 (2001). DOI
[72]
M. Takita et al., “Experimental Demonstration of Fault-Tolerant State Preparation with Superconducting Qubits”, Physical Review Letters 119, (2017). DOI; 1705.09259
[73]
E. H. Chen et al., “Calibrated Decoders for Experimental Quantum Error Correction”, Physical Review Letters 128, (2022). DOI; 2110.04285
[74]
Neereja Sundaresan et al., “Matching and maximum likelihood decoding of a multi-round subsystem quantum error correction experiment”. 2203.07205
[75]
Blake C. Stacey, “Sporadic SICs and Exceptional Lie Algebras”. 1911.05809
[76]
Odaka K., Sako Y., Iwamoto I., Doi T.; Vries L.B.; SONY: Error correctable data transmission method (Patent US4413340) filing date May 21, 1980.
[77]
W. C. Huffman and V. Pless, Fundamentals of Error-correcting Codes (Cambridge University Press, 2003). DOI
[78]
S. B. Wicker and V. K. Bhargava, Reed-solomon Codes and Their Applications (IEEE, 1999). DOI
[79]
J. Naor and M. Naor, “Small-bias probability spaces: efficient constructions and applications”, Proceedings of the twenty-second annual ACM symposium on Theory of computing - STOC '90 (1990). DOI
[80]
D. Bluvstein et al., “A quantum processor based on coherent transport of entangled atom arrays”, Nature 604, 451 (2022). DOI; 2112.03923
[81]
K. J. Satzinger et al., “Realizing topologically ordered states on a quantum processor”, Science 374, 1237 (2021). DOI; 2104.01180
[82]
G. Semeghini et al., “Probing topological spin liquids on a programmable quantum simulator”, Science 374, 1242 (2021). DOI; 2104.04119
[83]
Takao Aoki et al., “Quantum error correction beyond qubits”. 0811.3734
[84]
C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin. Erasure coding in Windows Azure Storage. In Proc. USENIX Annual Technical Conference (ATC), pgs. 15-26, Boston, Massachusetts, June 2012.
[85]
W. C. Huffman, J.-L. Kim, and P. Solé, Concise Encyclopedia of Coding Theory (Chapman and Hall/CRC, 2021). DOI
[86]
M. V. Patil, S. Pawar, and Z. Saquib, “Coding Techniques for 5G Networks: A Review”, 2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA) (2020). DOI
[87]
LDPC coding for OFDMA PHY. 802.16REVe Sponsor Ballot Recirculation comment, July 2004. IEEE C802.16e04/141r2
[88]
R. Purnamasari, H. Wijanto, and I. Hidayat, “Design and implementation of LDPC(Low Density Parity Check) coding technique on FPGA (Field Programmable Gate Array) for DVB-S2 (Digital Video Broadcasting-Satellite)”, 2014 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology (2014). DOI
[89]
Nikolay Borisov, Ivan Petrov, and Andrey Tayduganov, “Asymmetric adaptive LDPC-based information reconciliation for industrial quantum key distribution”. 2212.01121
[90]
Gaborit, P., Murat, G., Ruatta, O., & Zemor, G. (2013, April). Low rank parity check codes and their application to cryptography. In Proceedings of the Workshop on Coding and Cryptography WCC (Vol. 2013).
[91]
J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem”, Lecture Notes in Computer Science 267 (1998). DOI
[92]
R. Misoczki et al., “MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes”, 2013 IEEE International Symposium on Information Theory (2013). DOI
[93]
P. Gaborit et al., “RankSign: An Efficient Signature Algorithm Based on the Rank Metric”, Post-Quantum Cryptography 88 (2014). DOI
[94]
J. R. Wootton, “Demonstrating non-Abelian braiding of surface code defects in a five qubit experiment”, Quantum Science and Technology 2, 015006 (2017). DOI; 1609.07774
[95]
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progress Report pp. 114–116 (1978).
[96]
Ralf Koetter and Frank Kschischang, “Coding for Errors and Erasures in Random Network Coding”. cs/0703061
[97]
D. Silva, F. R. Kschischang, and R. Koetter, “A Rank-Metric Approach to Error Control in Random Network Coding”, IEEE Transactions on Information Theory 54, 3951 (2008). DOI; 0711.0708
[98]
C. Noel et al., “Measurement-induced quantum phases realized in a trapped-ion quantum computer”, Nature Physics 18, 760 (2022). DOI; 2106.05881
[99]
O. Regev, “On lattices, learning with errors, random linear codes, and cryptography”, Journal of the ACM 56, 1 (2009). DOI
[100]
M. Lassen et al., “Quantum optical coherence can survive photon losses using a continuous-variable quantum erasure-correcting code”, Nature Photonics 4, 700 (2010). DOI; 1006.3941
[101]
R. L. Cook, P. J. Martin, and J. M. Geremia, “Optical coherent state discrimination using a closed-loop quantum measurement”, Nature 446, 774 (2007). DOI
[102]
K. Tsujino et al., “Sub-shot-noise-limit discrimination of on-off keyed coherent signals via a quantum receiver with a superconducting transition edge sensor”, Optics Express 18, 8107 (2010). DOI
[103]
Encyclopedia of Computer Science and Technology, Second Edition Volume I (CRC Press, 2017). DOI
[104]
S. Devadas and A. R. Newton, “Decomposition and factorization of sequential finite state machines”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 8, 1206 (1989). DOI
[105]
K. Potdar, T. S., and C. D., “A Comparative Study of Categorical Variable Encoding Techniques for Neural Network Classifiers”, International Journal of Computer Applications 175, 7 (2017). DOI
[106]
J. Chen et al., “Optical codeword demodulation with error rates below the standard quantum limit using a conditional nulling receiver”, Nature Photonics 6, 374 (2012). DOI; 1111.4017
[107]
F. E. Becerra et al., “Experimental demonstration of a receiver beating the standard quantum limit for multiple nonorthogonal state discrimination”, Nature Photonics 7, 147 (2013). DOI
[108]
S. Izumi et al., “Experimental Demonstration of a Quantum Receiver Beating the Standard Quantum Limit at Telecom Wavelength”, Physical Review Applied 13, (2020). DOI; 2001.05902
[109]
F. E. Becerra, J. Fan, and A. Migdall, “Photon number resolution enables quantum receiver for realistic coherent optical communications”, Nature Photonics 9, 48 (2014). DOI
[110]
A. R. Ferdinand, M. T. DiMario, and F. E. Becerra, “Multi-state discrimination below the quantum noise limit at the single-photon level”, npj Quantum Information 3, (2017). DOI; 1711.00074
[111]
I. A. Burenkov et al., “Experimental demonstration of time resolving quantum receiver for bandwidth and power efficient communications”, Conference on Lasers and Electro-Optics (2020). DOI
[112]
Jeffrey M. Gertler et al., “Experimental Realization and Characterization of Stabilized Pair Coherent States”. 2209.11643
[113]
International Telecommunication Union-T, Recommendation V.27ter: 4800/2400 Bits Per Second Modem Standardized For Use in the General Switched Telephone Network, 1984
[114]
3rd Generation Partnership Project (3GPP), Technical specification group radio access network, 3GPP TS 38.212 V.15.0.0, 2017.
[115]
Michael Lahanas. "Ancient Greek Communication Methods". https://web.archive.org/web/20141102224501/http://www.mlahanas.de/Greeks/Communication.htm. Archived from the original on 2014-11-02.
[116]
A. B. Raj and A. K. Majumder, “Historical perspective of free space optical communications: from the early dates to today's developments”, IET Communications 13, 2405 (2019). DOI
[117]
K. Feher, “Modems for emerging digital cellular-mobile radio system”, IEEE Transactions on Vehicular Technology 40, 355 (1991). DOI
[118]
International Telecommunication Union-T, Recommendation V.24: List of definitions for interchange circuits between data terminal equipment (DTE) and data circuit-terminating equipment (DCE), 1988
[119]
F. Buchali et al., “Rate Adaptation and Reach Increase by Probabilistically Shaped 64-QAM: An Experimental Demonstration”, Journal of Lightwave Technology 34, 1599 (2016). DOI
[120]
International Telecommunication Union-T, Recommendation V.29: 9600 Bits Per Second Modem Standardized For Use on Point-to-Point 4-Wire Leased Telephone-Tpe Circuits, 1993
[121]
Max Hopkins and Ting-Chun Lin, “Explicit Lower Bounds Against $Ω(n)$-Rounds of Sum-of-Squares”. 2204.11469
[122]
Anurag Anshu, Nikolas P. Breuckmann, and Chinmay Nirkhe, “NLTS Hamiltonians from good quantum codes”. 2206.13228
[123]
M. H. Freedman and M. B. Hastings, “Quantum Systems on Non-$k$-Hyperfinite Complexes: A Generalization of Classical Statistical Mechanics on Expander Graphs”. 1301.1363
[124]
N. H. Nguyen et al., “Demonstration of Shor Encoding on a Trapped-Ion Quantum Computer”, Physical Review Applied 16, (2021). DOI; 2104.01205
[125]
D. G. Cory et al., “Experimental Quantum Error Correction”, Physical Review Letters 81, 2152 (1998). DOI; quant-ph/9802018
[126]
O. Moussa et al., “Demonstration of Sufficient Control for Two Rounds of Quantum Error Correction in a Solid State Ensemble Quantum Information Processor”, Physical Review Letters 107, (2011). DOI; 1108.4842
[127]
J. Zhang et al., “Experimental quantum error correction with high fidelity”, Physical Review A 84, (2011). DOI; 1109.4821
[128]
M. D. Reed et al., “Realization of three-qubit quantum error correction with superconducting circuits”, Nature 482, 382 (2012). DOI; 1109.4948
[129]
D. Ristè et al., “Detecting bit-flip errors in a logical qubit using stabilizer measurements”, Nature Communications 6, (2015). DOI; 1411.5542
[130]
J. Cramer et al., “Repeated quantum error correction on a continuously encoded qubit by real-time feedback”, Nature Communications 7, (2016). DOI; 1508.01388
[131]
J. R. Wootton and D. Loss, “Repetition code of 15 qubits”, Physical Review A 97, (2018). DOI; 1709.00990
[132]
J. R. Wootton, “Benchmarking near-term devices with quantum error correction”, Quantum Science and Technology 5, 044004 (2020). DOI; 2004.11037
[133]
J. Kelly et al., “State preservation by repetitive error detection in a superconducting quantum circuit”, Nature 519, 66 (2015). DOI; 1411.7403
[134]
Google Quantum AI et al., “Exponential suppression of bit or phase errors with cyclic error correction”, Nature 595, 383 (2021). DOI; 2102.06132
[135]
Rajeev Acharya et al., “Suppressing quantum errors by scaling a surface code logical qubit”. 2207.06431
[136]
Kevin C. Miao et al., “Overcoming leakage in scalable quantum error correction”. 2211.04728
[137]
W. P. Livingston et al., “Experimental demonstration of continuous quantum error correction”, Nature Communications 13, (2022). DOI; 2107.11398
[138]
K. Takeda et al., “Quantum error correction with silicon spin qubits”, Nature 608, 682 (2022). DOI; 2201.08581
[139]
F. van Riggelen et al., “Phase flip code with semiconductor spin qubits”. 2202.11530
[140]
G. Waldherr et al., “Quantum error correction in a solid-state hybrid spin register”, Nature 506, 204 (2014). DOI; 1309.6424
[141]
T. Nakazato et al., “Quantum error correction of spin quantum memories in diamond under a zero magnetic field”, Communications Physics 5, (2022). DOI
[142]
T. H. Taminiau et al., “Universal control and error correction in multi-qubit spin registers in diamond”, Nature Nanotechnology 9, 171 (2014). DOI; 1309.5452
[143]
P. Schindler et al., “Experimental Repetitive Quantum Error Correction”, Science 332, 1059 (2011). DOI
[144]
Yunfeng Lin, Ben Liang, and Baochun Li, “Priority Random Linear Codes in Distributed Storage Systems”, IEEE Transactions on Parallel and Distributed Systems 20, 1653 (2009). DOI
[145]
P. Gaborit et al., “Identity-Based Encryption from Codes with Rank Metric”, Advances in Cryptology – CRYPTO 2017 194 (2017). DOI
[146]
P. Lefèvre, P. Carré, and P. Gaborit, “Application of rank metric codes in digital image watermarking”, Signal Processing: Image Communication 74, 119 (2019). DOI
[147]
D. Silva and F. R. Kschischang, “Rank-Metric Codes for Priority Encoding Transmission with Network Coding”, 2007 10th Canadian Workshop on Information Theory (CWIT) (2007). DOI
[148]
Anxiao Jiang et al., “Rank Modulation for Flash Memories”, IEEE Transactions on Information Theory 55, 2659 (2009). DOI
[149]
J. L. Massey, “Deep-space communications and coding: A marriage made in heaven”, Advanced Methods for Satellite and Deep Space Communications 1. DOI
[150]
E.C. Posner, Combinatorial Structures in Planetary Reconnaissance in Error Correcting Codes, ed. H.B. Mann, Wiley, NY 1968.
[151]
D. Zhang, K. Ho-Van, and T. Le-Ngoc, “Impulse noise detection techniques for retransmission to reduce delay in DSL systems”, 2012 IEEE International Conference on Communications (ICC) (2012). DOI
[152]
A. Kiayias and M. Yung, “Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes”, Automata, Languages and Programming 232 (2002). DOI
[153]
D. V. Sarwate and N. R. Shanbhag, “High-speed architectures for Reed-Solomon decoders”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems 9, 641 (2001). DOI
[154]
Songze Li et al., “PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously”. 1809.10361
[155]
B. Sasidharan and E. Viterbo, “Private Data Access in Blockchain Systems Employing Coded Sharding”, 2021 IEEE International Symposium on Information Theory (ISIT) (2021). DOI
[156]
International Organization for Standardization, Information Technology: Automatic Identification and Data Capture Techniques-QR Code 2005 Bar Code Symbology Specification, 2nd ed., IEC18004 (ISO, 2006).
[157]
I. Shakeel et al., “Reed-Solomon coding for cooperative wireless communication”, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (2010). DOI
[158]
N. Shental et al., “Efficient high-throughput SARS-CoV-2 testing to detect asymptomatic carriers”, Science Advances 6, (2020). DOI
[159]
T. Klove and M. Miller, “The Detection of Errors After Error-Correction Decoding”, IEEE Transactions on Communications 32, 511 (1984). DOI
[160]
H. Janwa and O. Moreno, “[]”, Designs, Codes and Cryptography 8, 293 (1996). DOI
[161]
H. Chen and R. Cramer, “Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields”, Lecture Notes in Computer Science 521 (2006). DOI
[162]
R. Vidhya Lavanya and M. Madheswaran, “Wimax (IEEE 802.16 m) system based on space time block code and discrete multiwavelet transform and implementation in FPGA”, Telecommunication Systems 56, 327 (2013). DOI
[163]
S. P. Alex and L. M. A. Jalloul, “Performance Evaluation of MIMO in IEEE802.16e/WiMAX”, IEEE Journal of Selected Topics in Signal Processing 2, 181 (2008). DOI
[164]
“Advances in smart antennas - MIMO-OFDM wireless systems: basics, perspectives, and challenges”, IEEE Wireless Communications 13, 31 (2006). DOI
[165]
S. Krinner et al., “Realizing repeated quantum error correction in a distance-three surface code”, Nature 605, 669 (2022). DOI; 2112.03708
[166]
Y. Zhao et al., “Realization of an Error-Correcting Surface Code with Superconducting Qubits”, Physical Review Letters 129, (2022). DOI; 2112.13505
[167]
L. Frunzio and S. Singh, “Error-Correcting Surface Codes Get Experimental Vetting”, Physics 15, (2022). DOI
[168]
P. Chaichanavong and P. H. Siegel, “Tensor-product parity code for magnetic recording”, IEEE Transactions on Magnetics 42, 350 (2006). DOI
[169]
H. Hämäläinen and S. Rankinen, “Upper bounds for football pool problems and mixed covering codes”, Journal of Combinatorial Theory, Series A 56, 84 (1991). DOI
[170]
T. M. Thompson, From Error-Correcting Codes Through Sphere Packings To Simple Groups, Mathematical Association of America, 1983.
[171]
Z. Leghtas et al., “Confining the state of light to a quantum manifold by engineered two-photon loss”, Science 347, 853 (2015). DOI; 1412.4633
[172]
S. Touzard et al., “Coherent Oscillations inside a Quantum Manifold Stabilized by Dissipation”, Physical Review X 8, (2018). DOI; 1705.02401
[173]
A. Grimm et al., “Stabilization and operation of a Kerr-cat qubit”, Nature 584, 205 (2020). DOI; 1907.12131
[174]
R. Lescanne et al., “Exponential suppression of bit-flips in a qubit encoded in an oscillator”, Nature Physics 16, 509 (2020). DOI; 1907.11729
[175]
C. Berdou et al., “One hundred second bit-flip time in a two-photon dissipative oscillator”. 2204.09128
[176]
J. M. Gertler et al., “Protecting a bosonic qubit with autonomous quantum error correction”, Nature 590, 243 (2021). DOI; 2004.09322
[177]
J. Svigals, “IBM 7070 data processing system”, Papers presented at the the March 3-5, 1959, western joint computer conference on XX - IRE-AIEE-ACM '59 (Western) (1959). DOI
[178]
Trond I. Andersen et al., “Observation of non-Abelian exchange statistics on a superconducting processor”. 2210.10255
[179]
J. Meggitt, “Error correcting codes and their implementation for data transmission systems”, IEEE Transactions on Information Theory 7, 234 (1961). DOI
[180]
C. Campopiano and B. Glazer, “A Coherent Digital Amplitude and Phase Modulation Scheme”, IEEE Transactions on Communications 10, 90 (1962). DOI
[181]
G. Foschini, R. Gitlin, and S. Weinstein, “Optimization of Two-Dimensional Signal Constellations in the Presence of Gaussian Noise”, IEEE Transactions on Communications 22, 28 (1974). DOI
[182]
Chris N. Self, Marcello Benedetti, and David Amaro, “Protecting Expressive Circuits with a Quantum Error Detection Code”. 2211.06703
[183]
B. A. Bell et al., “Experimental demonstration of a graph state quantum error-correction code”, Nature Communications 5, (2014). DOI; 1404.5498
[184]
N. M. Linke et al., “Fault-tolerant quantum error detection”, Science Advances 3, (2017). DOI; 1611.06946
[185]
C. K. Andersen et al., “Repeated quantum error detection in a surface code”, Nature Physics 16, 875 (2020). DOI; 1912.09410
[186]
A. Erhard et al., “Entangling logical qubits with lattice surgery”, Nature 589, 220 (2021). DOI; 2006.03071
[187]
J. F. Marques et al., “Logical-qubit operations in an error-detecting surface code”, Nature Physics 18, 80 (2021). DOI; 2102.13071
[188]
D. Nigg et al., “Quantum computations on a topologically encoded qubit”, Science 345, 302 (2014). DOI; 1403.5426
[189]
C. Ryan-Anderson et al., “Realization of real-time fault-tolerant quantum error correction”. 2107.07505
[190]
P. Ball, “Real-Time Error Correction for Quantum Computing”, Physics 14, (2021). DOI
[191]
L. Postler et al., “Demonstration of fault-tolerant universal quantum gate operations”, Nature 605, 675 (2022). DOI; 2111.12654
[192]
D. M. Debroy et al., “Optimizing Stabilizer Parities for Improved Logical Qubit Memories”, Physical Review Letters 127, (2021). DOI; 2105.05068
[193]
Y.-H. Luo et al., “Quantum teleportation of physical qubits into logical code spaces”, Proceedings of the National Academy of Sciences 118, (2021). DOI; 2009.06242
[194]
R. Zhang et al., “Loss-tolerant all-photonic quantum repeater with generalized Shor code”, Optica 9, 152 (2022). DOI; 2203.07979