quantum cloning transformations for quantum cryptography


COMPUTER COURSE ONLINE

Computational geometric analysis of physically allowed quantum cloning transformations for quantum cryptography

FREE-DOWNLOADL Gyongyosi… – Proceedings of the 4th WSEAS international …, 2010 –
The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum
communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping
attacks for quantum cryptography are based on imperfect cloning machines. The




IEEE PAPER UNITED STATES