Write, autoreview, editor, reviewer
3,129
edits
Line 29: | Line 29: | ||
* '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications. It answers the following questions: | * '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications. It answers the following questions: | ||
**Quantum or classical task? | **Quantum or classical task? | ||
**Any classical or post-quantum secure analogue | **Any classical or post-quantum secure analogue? | ||
**Benchmark values for key length, security parameter, threshold values, etc? | **Benchmark values for key length, security parameter, threshold values, etc? | ||
**Real World Applications? | **Real World Applications? |