Device-independent two-party cryptography secure against sequential attacks
10.1088/1367-2630/18/5/055004
Saved in:
Main Authors: | Kaniewski, J, Wehner, S |
---|---|
Other Authors: | CENTRE FOR QUANTUM TECHNOLOGIES |
Format: | Article |
Published: |
Institute of Physics Publishing
2020
|
Subjects: | |
Online Access: | https://scholarbank.nus.edu.sg/handle/10635/175255 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Beating the Clauser-Horne-Shimony-Holt and the Svetlichny games with optimal states
by: Su, Hong-Yi, et al.
Published: (2018) -
Experimental E91 quantum key distribution
by: Ling, A., et al.
Published: (2014) -
Wringing out new bell inequalities for three-dimensional systems (Qutrits)
by: Chen, J.-L., et al.
Published: (2014) -
Tomographic quantum cryptography protocols are reference frame independent
by: Thinh, L.P., et al.
Published: (2014) -
RELATIVISTIC QUANTUM CRYPTOGRAPHY
by: JEDRZEJ KANIEWSKI
Published: (2015)