quantum cloning transformations for quantum cryptography


Computational geometric analysis of physically allowed quantum cloning transformations for quantum cryptography

FREE-DOWNLOAD L Gyongyosi… – Proceedings of the 4th WSEAS international …, 2010 –
The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum
communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping
attacks for quantum cryptography are based on imperfect cloning machines. The



COMMENT computer science, free research papers



FREE IEEE PAPER





quantum cloning transformations for quantum cryptography IEEE PAPER