SlideShare a Scribd company logo
Quantum Computers
New Generation of Computers
PART 9
QUANTUM COMPUTERS-
READINESS PLAN
Professor Lili Saghafi
Aug. 2015
Agenda
• QUANTUM COMPUTERS-READINESS PLAN
• RSA
• RSA problem
• SSL/TLS encryption
• (RLWE) problem
2
QUANTUM COMPUTERS-READINESS
PLAN
• Since instead of just computing in a linear binary way,
with the presence or absence of an electrical charge
being converted into "bits" of zeros or ones, Quantum
Computers can take the rich quantum properties of
subatomic particles and turn them into "Qubits" that
can be both zero and one at the same time.
• Quantum Computers could potentially run simulations
and solve problems that are far too big for today's
computers.
• But there is a catch: A Quantum Computer could also
break public encryption keys used today to keep data
safe.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
QUANTUM-READINESS PLAN
• Quantum-readiness plan, providing advice
about where vulnerabilities might be in the
quantum-computer era, and strategies and
tools that could be implemented now to make
any transition into that era much easier.
RSA
• RSA is one of the first practical public-key
cryptosystems and is widely used for secure data
transmission. In such a cryptosystem, the encryption key is
public and differs from the decryption key which is kept
secret.
• In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers,
the factoring problem. RSA is made of the initial letters of
the surnames of Ron Rivest, Adi Shamir and Leonard
Adleman, w
• ho first publicly described the algorithm in 1977. Clifford
Cocks, an English mathematician, had developed an
equivalent system in 1973, but it was not declassified until
1997.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
RSA problem
• RSA problem , a user of RSA creates and then
publishes a public key based on the two
large prime numbers, along with an auxiliary
value. The prime numbers must be kept secret.
• Anyone can use the public key to encrypt a
message, but with currently published methods,
if the public key is large enough, only someone
with knowledge of the prime numbers can
feasibly decode the message.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
RSA problem
• Breaking RSA encryption is known as the RSA
problem; whether it is as hard as the factoring
problem, it remains an open question.
• Quantum Computers are good for Data
encryption. Code are information in very large
number 768 bite number ,RSA code broken in
2010, it can take 3 years for Digital Computers.
1024 bite code number it takes 3000 years for
Digital Computers, and for Quantum Computers
in a minute.
RSA problem
• It was once believed that Quantum Computers could
only solve problems that had underlying mathematical
structures, such as code breaking.
• However, new algorithms have emerged that could
enable Quantum Machines to solve problems in fields
as diverse as weather prediction, materials science and
artificial intelligence.
• The ability of Quantum Computers to process massive
amounts of data in a relatively short amount of time
makes them extremely interesting to the scientific
community.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
SSL/TLS encryption
• Now because of security vulnerability to
Quantum Computers , websites that use the
widespread SSL/TLS encryption standard
currently tend to make use of the RSA algorithm,
which mathematician Peter Shor showed in 1994
could be easily broken by a quantum computer.
• Shor’s approach could also be used to crack
elliptic curve cryptography, another primitive
increasingly used with SSL/TLS.
(RLWE) problem
• The research focuses on building a protocol using one
of the primitives currently thought to be difficult for
quantum computers to solve, called the “ring learning
with errors” (RLWE) problem.
• Practical application of this , is by seeing how to design
a key exchange protocol that’s suitable for use in
SSL/TLS and then implementing and testing it.
• Rather than multiplying large prime numbers together
as in RSA encryption, or using points on a curve as in
elliptic curve cryptography, here the mathematical
operation is based on multiplying polynomials
together, then adding some random noise.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
RLWE
• The result makes it “much harder” to crack.
• RLWE hasn’t been studied intensively enough to prove
that it would be any more secure against quantum
computers than the techniques currently in use, but
the primitive seems to be one of the better bets
currently out there.
• If after years of cryptanalytic research no one manages
to break it, then it may achieve the corresponding
levels of confidence that the research community has
in the difficulty of currently accepted problems, like
factoring or elliptic curve discrete log.
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan
Thank you!
Great Audience
Professor Lili Saghafi
proflilisaghafi@gmail.com
© Prof. Lili Saghafi , All Rights Reserved
References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper
• Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/
• Youtube
• Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/
• TED Talks
• TEDXtalks
• http://www.slideshare.net/lsaghafi/
• Timo Elliot
• https://sites.google.com/site/psuircb/
• http://fortune.com/
• Theoretical Physicists John Preskill and Spiros Michalakis
• Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/
• quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole,
ICAM-I2CAM
• Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes
• D-Wave Systems
• References
• Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp
• William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL
=https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist
• Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5-
JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1
• I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL
= http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html
• David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of
Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition
• Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider-
perspective
• See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011.
• Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL
= http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine.
• Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution
• Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52.
• [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in
• The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL
=https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings
19
© Prof. Lili Saghafi , All Rights Reserved

More Related Content

PDF
Quantum computers new generation of computers part10 New Qubits Type
PDF
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
PDF
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
PDF
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
PDF
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
PPTX
Quantum computers, quantum key distribution, quantum networks
PDF
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
PDF
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum computers new generation of computers part10 New Qubits Type
Quantum Computers PART 1 & 2 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum computers, quantum key distribution, quantum networks
Quantum Computers New Generation of Computers Part 8 Quantum Error Correction...
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi

What's hot (20)

PPTX
Quantum computers
PPTX
Quantum Computing
PDF
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
PPTX
Quantum Computers Best Awarded Presentation
PPTX
Quantum Computing: Welcome to the Future
PDF
D-WaveQuantum ComputingAccess & applications via cloud deployment
PDF
Quantum computing
PDF
The Evolution of Quantum Computers
PPTX
Quantum Computers
PDF
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
PPTX
Quantum computers
PDF
Quantum computing
PDF
Introduction to Quantum Computing
PPTX
Quantum Computing
PDF
quantum computing and Quantum Communications
PPTX
Quantum computing.ppt
PPTX
2013.09.13 quantum computing has arrived s.nechuiviter
PPTX
QUANTUM COMPUTERS
PPTX
Quantum computing
Quantum computers
Quantum Computing
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Quantum Computers Best Awarded Presentation
Quantum Computing: Welcome to the Future
D-WaveQuantum ComputingAccess & applications via cloud deployment
Quantum computing
The Evolution of Quantum Computers
Quantum Computers
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum computers
Quantum computing
Introduction to Quantum Computing
Quantum Computing
quantum computing and Quantum Communications
Quantum computing.ppt
2013.09.13 quantum computing has arrived s.nechuiviter
QUANTUM COMPUTERS
Quantum computing
Ad

Viewers also liked (10)

PPTX
Research Methods in Education and Education Technology Prof Lili Saghafi Con...
PPSX
Agile Project Management By Professor Lili Saghafi
PPTX
QUANTUM COMP 22
PPTX
Big data and Predictive Analytics By : Professor Lili Saghafi
PPTX
Nanotech presentation
PPT
Nanotechnology: Basic introduction to the nanotechnology.
PPT
Nano technology
PPT
Nanotechnology
PPTX
Nanotechnology ppt
PPTX
NANOTECHNOLOGY AND IT'S APPLICATIONS
Research Methods in Education and Education Technology Prof Lili Saghafi Con...
Agile Project Management By Professor Lili Saghafi
QUANTUM COMP 22
Big data and Predictive Analytics By : Professor Lili Saghafi
Nanotech presentation
Nanotechnology: Basic introduction to the nanotechnology.
Nano technology
Nanotechnology
Nanotechnology ppt
NANOTECHNOLOGY AND IT'S APPLICATIONS
Ad

Similar to Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan (20)

DOCX
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
PDF
Why Should You Pay Attention To Quantum Computing?
PPTX
Quantum Secured Blockchain
PPTX
Always Offline: Delay-Tolerant Networking for the Internet of Things
PDF
10.11648.j.ijdst.20160204.12
PPTX
Implication of rh and qc on information security sharad nalawade(author)
PPTX
5 Reasons Why You Should Learn About Quantum Technologies.pptx
PPTX
Cloud COMPUTING INTRODUCTION Unit -1 final.pptx
PPTX
Cryptography & Quantum Computing.pptx
PPTX
Quantum Computing vs Encryption: A Battle to Watch Out for
PDF
The Internet-of-things: Architecting for the deluge of data
PDF
ITNW 2164 ResearchPaper
PDF
北航云计算公开课01 introduction to cloud computing technology
PPTX
01 introduction to cloud computing technology
PDF
Web History 101, or How the Future is Unwritten
PPTX
QuantumComputersPresentation
PPTX
Big data business case
PDF
The Quantum Era & Quantum Key Distribution
PDF
Internet of Things
PPTX
Evolution of network - computer networks
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Why Should You Pay Attention To Quantum Computing?
Quantum Secured Blockchain
Always Offline: Delay-Tolerant Networking for the Internet of Things
10.11648.j.ijdst.20160204.12
Implication of rh and qc on information security sharad nalawade(author)
5 Reasons Why You Should Learn About Quantum Technologies.pptx
Cloud COMPUTING INTRODUCTION Unit -1 final.pptx
Cryptography & Quantum Computing.pptx
Quantum Computing vs Encryption: A Battle to Watch Out for
The Internet-of-things: Architecting for the deluge of data
ITNW 2164 ResearchPaper
北航云计算公开课01 introduction to cloud computing technology
01 introduction to cloud computing technology
Web History 101, or How the Future is Unwritten
QuantumComputersPresentation
Big data business case
The Quantum Era & Quantum Key Distribution
Internet of Things
Evolution of network - computer networks

More from Professor Lili Saghafi (20)

PDF
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
PPTX
Software Engineering
PDF
Introduction to Quantum Computing Lecture 1: Fundamentals
PDF
Software Engineering_Agile Software Development By: Professor Lili Saghafi
PDF
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
PDF
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
PDF
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
PDF
Introduction to Blockchain Technology By Professor Lili Saghafi
PDF
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
PPT
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
PDF
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
PDF
Machine learning by using python By: Professor Lili Saghafi
PDF
What is digital humanities ,By: Professor Lili Saghafi
PDF
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
PDF
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
PDF
Data Science unit 2 By: Professor Lili Saghafi
PDF
Data science unit 1 By: Professor Lili Saghafi
PDF
Data Scientist By: Professor Lili Saghafi
PDF
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Software Engineering
Introduction to Quantum Computing Lecture 1: Fundamentals
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili Saghafi
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
Data Scientist By: Professor Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Machine Learning_overview_presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Spectral efficient network and resource selection model in 5G networks
sap open course for s4hana steps from ECC to s4
Machine Learning_overview_presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Chapter 3 Spatial Domain Image Processing.pdf

Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan

  • 1. Quantum Computers New Generation of Computers PART 9 QUANTUM COMPUTERS- READINESS PLAN Professor Lili Saghafi Aug. 2015
  • 2. Agenda • QUANTUM COMPUTERS-READINESS PLAN • RSA • RSA problem • SSL/TLS encryption • (RLWE) problem 2
  • 3. QUANTUM COMPUTERS-READINESS PLAN • Since instead of just computing in a linear binary way, with the presence or absence of an electrical charge being converted into "bits" of zeros or ones, Quantum Computers can take the rich quantum properties of subatomic particles and turn them into "Qubits" that can be both zero and one at the same time. • Quantum Computers could potentially run simulations and solve problems that are far too big for today's computers. • But there is a catch: A Quantum Computer could also break public encryption keys used today to keep data safe.
  • 5. QUANTUM-READINESS PLAN • Quantum-readiness plan, providing advice about where vulnerabilities might be in the quantum-computer era, and strategies and tools that could be implemented now to make any transition into that era much easier.
  • 6. RSA • RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. • In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, w • ho first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it was not declassified until 1997.
  • 8. RSA problem • RSA problem , a user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. • Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message.
  • 10. RSA problem • Breaking RSA encryption is known as the RSA problem; whether it is as hard as the factoring problem, it remains an open question. • Quantum Computers are good for Data encryption. Code are information in very large number 768 bite number ,RSA code broken in 2010, it can take 3 years for Digital Computers. 1024 bite code number it takes 3000 years for Digital Computers, and for Quantum Computers in a minute.
  • 11. RSA problem • It was once believed that Quantum Computers could only solve problems that had underlying mathematical structures, such as code breaking. • However, new algorithms have emerged that could enable Quantum Machines to solve problems in fields as diverse as weather prediction, materials science and artificial intelligence. • The ability of Quantum Computers to process massive amounts of data in a relatively short amount of time makes them extremely interesting to the scientific community.
  • 13. SSL/TLS encryption • Now because of security vulnerability to Quantum Computers , websites that use the widespread SSL/TLS encryption standard currently tend to make use of the RSA algorithm, which mathematician Peter Shor showed in 1994 could be easily broken by a quantum computer. • Shor’s approach could also be used to crack elliptic curve cryptography, another primitive increasingly used with SSL/TLS.
  • 14. (RLWE) problem • The research focuses on building a protocol using one of the primitives currently thought to be difficult for quantum computers to solve, called the “ring learning with errors” (RLWE) problem. • Practical application of this , is by seeing how to design a key exchange protocol that’s suitable for use in SSL/TLS and then implementing and testing it. • Rather than multiplying large prime numbers together as in RSA encryption, or using points on a curve as in elliptic curve cryptography, here the mathematical operation is based on multiplying polynomials together, then adding some random noise.
  • 16. RLWE • The result makes it “much harder” to crack. • RLWE hasn’t been studied intensively enough to prove that it would be any more secure against quantum computers than the techniques currently in use, but the primitive seems to be one of the better bets currently out there. • If after years of cryptanalytic research no one manages to break it, then it may achieve the corresponding levels of confidence that the research community has in the difficulty of currently accepted problems, like factoring or elliptic curve discrete log.
  • 18. Thank you! Great Audience Professor Lili Saghafi proflilisaghafi@gmail.com © Prof. Lili Saghafi , All Rights Reserved
  • 19. References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper • Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/ • Youtube • Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/ • TED Talks • TEDXtalks • http://www.slideshare.net/lsaghafi/ • Timo Elliot • https://sites.google.com/site/psuircb/ • http://fortune.com/ • Theoretical Physicists John Preskill and Spiros Michalakis • Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/ • quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole, ICAM-I2CAM • Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes • D-Wave Systems • References • Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp • William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL =https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist • Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5- JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1 • I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL = http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html • David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition • Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider- perspective • See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011. • Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL = http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine. • Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution • Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52. • [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in • The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL =https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings 19 © Prof. Lili Saghafi , All Rights Reserved