Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Quantum Information: Attacks and Cloning
Graph Chatbot
Related lectures (31)
Previous
Page 2 of 4
Next
Quantum Key Distribution: Security and Implementation
Explores Device Independent Quantum Key Distribution (DIQKD) principles, security proofs, and experimental demonstrations against quantum computer threats.
Quantum Entanglement
Delves into quantum entanglement, exploring entangled particles' state, evolution, and measurement.
Quantum Information: Superdense Coding
Explores superdense coding in quantum information, covering encoding protocols, entanglement, and classic hits in communication.
Quantum Entanglement: Bell Test Protocols and Results
Covers the implementation of a Bell test protocol using superconducting qubits to demonstrate quantum entanglement over a distance of 30 meters.
Quantum photonic networks: entanglement and protocols
Explores quantum communication, entanglement, and photon generation in networks.
Quantum Repeaters and Memories: Basics and Applications
By Mikael Afzelius explores quantum repeaters, memories, light-matter interactions, and the Bloch sphere representation in quantum information processing.
Quantum Key Distribution
Covers the BB84 Quantum Key Distribution protocol for secure key establishment.
Quantum Source Coding
Covers entropic notions in quantum sources, Shannon entropy, Von Neumann entropy, and source coding.
Quantum Information: Density Matrices
Explores density matrices, quantum states representation, and entropy in quantum information.
Quantum Key Distribution: BB84
Explores Quantum Key Distribution (QKD) and the BB84 protocol for secure communication using quantum principles.