Write, autoreview, editor, reviewer
3,129
edits
Line 28: | Line 28: | ||
#Technological Readiness:</br> | #Technological Readiness:</br> | ||
*'''Example''' | *'''Example:''' link to the example paper to be discussed below is provided here | ||
---- | ---- | ||
#'''Properties''' A list of important information extracted from the protocol | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions), setup assumptions, etc.. | ||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm | #'''Pseudo Code''' Mathematical step-wise protocol algorithm | ||