Write, autoreview, editor, reviewer
3,125
edits
m (→Structure) |
m (→Structure) |
||
Line 20: | Line 20: | ||
*'''Example:''' | *'''Example:''' | ||
---- | ---- | ||
#'''Outline''' | #'''Outline''' A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols. | ||
A non-mathematical detailed outline which provides a rough idea of the method described. A figure is accommodated for most protocols. | |||
#'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | #'''Properties''' A list of important information extracted from the protocol such as, Parameters (threshold values), security claim, success probability, adversarial assumption (see [[Quantum Adversary Definitions|Quantum Adversary Definitions)]], setup assumptions, etc.. | ||
#'''Pseudo Code''' Mathematical step-wise protocol algorithm | #'''Pseudo Code''' Mathematical step-wise protocol algorithm |