Write, autoreview, editor, reviewer
3,129
edits
mNo edit summary |
mNo edit summary |
||
Line 48: | Line 48: | ||
*'''Hardware requirements''' | *'''Hardware requirements''' | ||
# Order of digits related to threshold values, QBit Error Rate (QBER), parameters, etc.. are illustrated in this section. | # Order of digits related to threshold values, QBit Error Rate (QBER), parameters, etc.. are illustrated in this section. | ||
---- | |||
*'''Properties''' A list of important information extracted from the protocol such as, parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]]) etc.. | *'''Properties''' A list of important information extracted from the protocol such as, parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]]) etc.. | ||
---- | |||
*'''Pseudo Code''' Mathematical step-wise protocol algorithm helpful to write a subroutine. | |||
---- | |||
*'''Discussion''' | *'''Discussion''' | ||
---- | ---- |