Write, autoreview, editor, reviewer
3,129
edits
mNo edit summary |
mNo edit summary |
||
Line 45: | Line 45: | ||
---- | ---- | ||
*'''Notations used''' Connects the non-mathematical outline with further sections. | *'''Notations used''' Connects the non-mathematical outline with further sections. | ||
*'''Hardware requirements''' | *'''Hardware requirements''' Order of digits related to threshold values, QBit Error Rate (QBER), parameters, etc.. are illustrated in this section. | ||
---- | ---- | ||
*'''Properties''' A list of important information extracted from the protocol such as, parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]]) etc.. | *'''Properties''' A list of important information extracted from the protocol such as, parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]]) etc.. |