pith. machine review for the scientific record. sign in

arxiv: quant-ph/0402052 · v1 · submitted 2004-02-06 · 🪐 quant-ph

Recognition: unknown

The ping-pong protocol can be attacked without eavesdropping

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords eavesdroppingping-pongprotocolwithoutattackattacked
0
0 comments X
read the original abstract

Attack the ping-pong protocol without eavesdropping.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.