Login / Signup
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices.
Carl A. Miller
Yaoyun Shi
Published in:
STOC (2014)
Keyphrases
</>
mobile devices
computationally efficient
intrusion detection
database systems
embedded systems