Quantum Internet Security: Protocols for Quantum Key Distribution
Eighth, Cryptography after Quantum and QKD:Here we discuss the ways in which QKD and post-quantum cryptography interact, and we look at how a strong security framework may be built by integrating conventional cryptographic techniques with algorithms that are resistant to quantum attacks.
Quantum Internet Security: Protocols for Quantum Key Distribution Read More »