Write, autoreview, editor, reviewer
3,129
edits
Line 5: | Line 5: | ||
# [https://doi.org/10.1017/CBO9781139525343 Quantum Information Theory] Mark M. Wilde. Cambridge University Press (2013) | # [https://doi.org/10.1017/CBO9781139525343 Quantum Information Theory] Mark M. Wilde. Cambridge University Press (2013) | ||
===Review Articles=== | ===Review Articles=== | ||
#[https://arxiv.org/abs/1510.06120 Quantum Cryptography Beyond Quantum Key Distribution] Broadbent, A. & Schaffner, C. Des. Codes Cryptogr. (2016) 78: 351. | #[https://arxiv.org/abs/1510.06120 Quantum Cryptography Beyond Quantum Key Distribution] Broadbent, A. & Schaffner, C. Des. Codes Cryptogr. (2016) 78: 351. | ||
#[https://www.nature.com/articles/npjqi201625 Practical Challenges in quantum key distribution] | #[https://www.nature.com/articles/npjqi201625 Practical Challenges in quantum key distribution] Eleni Diamanti, Hoi-Kwong Lo, Bing Qi & Zhiliang Yuan. npj Quantum Information volume 2, Article number: 16025 (2016) | ||
#[https://cacm.acm.org/magazines/2019/4/235578-cyber-security-in-the-quantum-era/fulltext Cyber Security in the Quantum Era] | #[https://cacm.acm.org/magazines/2019/4/235578-cyber-security-in-the-quantum-era/fulltext Cyber Security in the Quantum Era] | ||
#[https://arxiv.org/pdf/quant-ph/9504002.pdf Quantum Cryptography] | #[https://arxiv.org/pdf/quant-ph/9504002.pdf Quantum Cryptography] |