quantum cloning transformations for quantum cryptography





Computational geometric analysis of physically allowed quantum cloning transformations for quantum cryptography

FREE-DOWNLOADL Gyongyosi… – Proceedings of the 4th WSEAS international …, 2010 –
The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum
communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping
attacks for quantum cryptography are based on imperfect cloning machines. The




AI SOFTWARE TOOLS+IN+INDUSTRY