Write, autoreview, editor, reviewer
3,125
edits
m (→Structure) |
m (→Structure) |
||
Line 20: | Line 20: | ||
*'''Example:''' | *'''Example:''' | ||
---- | ---- | ||
#'''Outline'''</br> | |||
A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols. | A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols. | ||
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. |