Login / Signup
Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.
Charles H. Bennett
Gilles Brassard
Seth Breidbart
Published in:
Nat. Comput. (2014)
Keyphrases
</>
cellular automata
information security
artificial intelligence
quantum computing
quantum inspired
quantum computation
database
genetic algorithm
power consumption
low power
quantum mechanics