Login / Signup

Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP.

Charles H. BennettGilles BrassardSeth Breidbart
Published in: Nat. Comput. (2014)
Keyphrases
  • cellular automata
  • information security
  • artificial intelligence
  • quantum computing
  • quantum inspired
  • quantum computation
  • database
  • genetic algorithm
  • power consumption
  • low power
  • quantum mechanics