Write, autoreview, editor, reviewer
3,129
edits
Line 27: | Line 27: | ||
* '''Tags''' Any related page or list of protocols is connected by this section | * '''Tags''' Any related page or list of protocols is connected by this section | ||
---- | ---- | ||
* '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications. | * '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications. It answers the following questions: | ||
**Quantum or classical task? | |||
**Any classical or post-quantum secure analogue | |||
**Benchmark values for key length, security parameter, threshold values, etc? | |||
**Real World Applications? | |||
---- | ---- | ||
*'''Protocols''' List of different types of example protocol achieving the functionality (each protocol in this list is written in the format given below) depending on the task achieved or [[:Category: Network Stages|Network Stages]] required to achieve the same functionality | *'''Protocols''' List of different types of example protocol achieving the functionality (each protocol in this list is written in the format given below) depending on the task achieved or [[:Category: Network Stages|Network Stages]] required to achieve the same functionality |