Login / Signup

Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.

Frédéric DupuisJesper Buus NielsenLouis Salvail
Published in: CRYPTO (2010)
Keyphrases
  • neural network
  • evaluation method
  • evaluation model
  • evaluation criteria
  • gold standard
  • evaluation methods
  • security issues
  • security analysis