<--- Back to Details
First PageDocument Content
Quantum cryptography / Theoretical computer science / Quantum information science / Cryptography / Quantum mechanics / Emerging technologies / Quantum computing / Applied mathematics / Quantum key distribution / Squeezed coherent state / Decoy state
Date: 2004-07-27 17:15:17
Quantum cryptography
Theoretical computer science
Quantum information science
Cryptography
Quantum mechanics
Emerging technologies
Quantum computing
Applied mathematics
Quantum key distribution
Squeezed coherent state
Decoy state

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

Add to Reading List

Source URL: qist.lanl.gov

Download Document from Source Website

File Size: 256,94 KB

Share Document on Facebook

Similar Documents

CS378, MA375T, PHY341  Homework 1 Homework 1 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

CS378, MA375T, PHY341  Homework 2 Homework 2 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

CS378, MA375T, PHY341  Homework 9 Homework 9 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 9 Homework 9 Introduction to Quantum Information Science

DocID: 1xVwY - View Document

CS378, MA375T, PHY341  Homework 4 Homework 4 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 4 Homework 4 Introduction to Quantum Information Science

DocID: 1xVe2 - View Document

CS378, MA375T, PHY341  Homework 6 Homework 6 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 6 Homework 6 Introduction to Quantum Information Science

DocID: 1xUVZ - View Document