[7] P. W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," *Proceedings of 35th Annual Symposium on Foundations of Computer Science*, IEEE Computer Society Press, Los Alamitos, CA, 1994 pp.124-134.

[8] C. H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani, "Strengths and Weaknesses of Quantum Computation," *SIAM Journal on Computing*, **26**, 1997 pp. 1510-1523.

[10] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," *Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing*, Bangalore, India, 1984 pp. 175-179.

[11] C. H. Bennett, G. Brassard, C. Crepeau, R. Josza, A. Peres, and W. K. Wooters, "Teleporting an Unknown Quantum State
via Dual Classical and Einstein-Podolsky-Rosen Channels," *Physical Review Letters*, **70**, 1993 pp. 1895-1898.

[21] G. Mahler and I. Kim, "Moving Quantum Agents in a Finite Environment," P. Blanchard, D. Giulini, E. Joos, C. Kiefer,
and I.-O. Stamatescu (Eds.) Decoherence: Theoretical, Experimental, and Conceptual Problems Proceedings of a Workshop Held
at Bielefeld, Germany, 10-14 November 1998, *Lecture Notes in Physics*, **538**, Springer Verlag.

[24] R. P. Feynman, R. B. Leighton, and M. Sands, *Lectures on Physics*, Vol. 3, 6th ed., Reading, MA: Addison-Wesley Publishing Company, 1977.