Login / Signup

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices.

Carl A. MillerYaoyun Shi
Published in: STOC (2014)
Keyphrases
  • mobile devices
  • computationally efficient
  • intrusion detection
  • database systems
  • embedded systems