Login / Signup
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
Frédéric Dupuis
Jesper Buus Nielsen
Louis Salvail
Published in:
CRYPTO (2010)
Keyphrases
</>
neural network
evaluation method
evaluation model
evaluation criteria
gold standard
evaluation methods
security issues
security analysis