Login / Signup

Two-Source Extractors Secure Against Quantum Adversaries.

Roy KasherJulia Kempe
Published in: Theory Comput. (2012)
Keyphrases
  • key management
  • lightweight
  • security requirements
  • quantum mechanics
  • quantum computing
  • data sets
  • case study
  • multiple sources
  • security protocols
  • quantum inspired
  • covert channel