Quantum key distribution using sequential weak values
From MaRDI portal
Publication:482058
DOI10.1007/S40509-014-0003-9zbMATH Open1304.81066OpenAlexW1993626468MaRDI QIDQ482058FDOQ482058
Authors: James E. Troupe
Publication date: 19 December 2014
Published in: Quantum Studies: Mathematics and Foundations (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s40509-014-0003-9
Recommendations
Cites Work
- Quantum cryptography based on Bell’s theorem
- Quantum Paradoxes
- Quantum cryptography: public key distribution and coin tossing
- Proposed experiment to test local hidden-variable theories
- Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?
- Revisiting Hardy's paradox: Counterfactual statements, real measurements, entanglement and weak values
- Generalized privacy amplification
- Title not available (Why is that?)
- Quantum mechanics, local realistic theories, and Lorentz-invariant realistic theories
- Linear stability of thermocapillary flow in partially confined half-zones
- Pre- and post-selection, weak values and contextuality
Cited In (3)
This page was built for publication: Quantum key distribution using sequential weak values
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q482058)