Day 28 Quantum Protocols and Quantum Algorithms

Quantum Key Distribution
Qiskit

  1. Alice generates set of random bits
  2. Alice encodes in Z and X-bases at random and sends to Bob
  3. Bob measure in same basis Alice prepared
    Without interception -> Bob would be guaranteed to measure 0
  4. Bob and Alice reveal basis choices and discard useless bits
  5. Bob and Alice compare same random selection to see if qubits were intercepted

<<:  Day 28 让我胆战心惊的微服务 Vol.2

>>:  28. 表单验证

离职倒数10天:做产品才知道政治敏感不只存在两岸之间

我第一次在微软 release 产品时,学到一件很意外的事是:这世界上政治敏感区域原来不只有台湾跟中...

Day29 - Exploitation- Linux kernels 漏洞

Linux kernels 常有一些可以从一般使用者提权到 root 的漏洞,如 DirtyCOW ...

Day 22.5 | Livewire 实作 购物网站: 建立资料表

本来预计都写在 Day22 的,但是加上本篇内容後会让一天的篇幅太长,且考虑到有些夥伴可能没有建立资...

Simplifying Conditional Logic

本文同步於个人部落格: Simplifying Conditional Logic This art...

AutoCAD ActiveX #5-2 Selection Filters (-4)

filtertype -4 Grouping code filterdata remarks &q...