Login / Signup
Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices.
Carl A. Miller
Yaoyun Shi
Published in:
J. ACM (2016)
Keyphrases
</>
third party
computationally efficient
neural network
information retrieval
low cost
quantum computing