Login / Signup
Two-Source Extractors Secure Against Quantum Adversaries.
Roy Kasher
Julia Kempe
Published in:
Theory Comput. (2012)
Keyphrases
</>
key management
lightweight
security requirements
quantum mechanics
quantum computing
data sets
case study
multiple sources
security protocols
quantum inspired
covert channel