5.2.2 Key distribution with an storage limited eavesdropper
Course subject(s)
05. Distributing keys
In this second example, we will assume that Eve’s memory is limited. Can we distribute keys?
Sorry but there don't seem to be any downloads..
Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.