Experimental quantum key distribution certified by Bell's theorem

Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...

সম্পূর্ণ বিবরণ

গ্রন্থ-পঞ্জীর বিবরন
প্রধান লেখক: Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D
বিন্যাস: Journal article
ভাষা:English
প্রকাশিত: Springer Nature 2022