|
|
| VIDEO LIBRARY |
|
|
|||
|
Application of post-selective transformations to construct attack strategies in quantum cryptography D. A. Kronberg |
|||
|
Abstract: Quantum cryptography relies on the limitations of quantum mechanics to ensure the security of quantum key distribution (QKD) protocols. At the same time, constructing effective attacks in quantum cryptography allows us to understand the limits of the applicability of QKD protocols. This talk will examine the fundamental limitations of post-selective transformations of ensembles of quantum states and the use of attack strategies associated with these transformations. |
|||