Main Page: Difference between revisions

Jump to navigation Jump to search
Line 27: Line 27:
* '''Tags''' Any related page or list of protocols is connected by this section
* '''Tags''' Any related page or list of protocols is connected by this section
----
----
* '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications.
* '''Use Case''' (if available) compares security, efficiency and practicality of quantum protocols with its available classical analogues; connects protocols with real world applications. It answers the following questions:
 
**Quantum or classical task?
**Any classical or post-quantum secure analogue
**Benchmark values for key length, security parameter, threshold values, etc?
**Real World Applications?
----
----
*'''Protocols''' List of different types of example protocol achieving the functionality (each protocol in this list is written in the format given below) depending on the task achieved or [[:Category: Network Stages|Network Stages]] required to achieve the same functionality
*'''Protocols''' List of different types of example protocol achieving the functionality (each protocol in this list is written in the format given below) depending on the task achieved or [[:Category: Network Stages|Network Stages]] required to achieve the same functionality
Write, autoreview, editor, reviewer
3,125

edits

Navigation menu