Recognition: unknown
The ping-pong protocol can be attacked without eavesdropping
classification
🪐 quant-ph
keywords
eavesdroppingping-pongprotocolwithoutattackattacked
read the original abstract
Attack the ping-pong protocol without eavesdropping.
This paper has not been read by Pith yet.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.