Hour: From 10:00h to 12:00h
Place: BLR & Online (Zoom)
THEORY LECTURE: Quantum Key Distribution (Part 3)
ICFO
The lectures start by explaining the standard protocols for quantum key distribution, and then discuss their security proofs and implementations. After presenting some of the hacking attacks on these protocols, we introduce the device-independent formalism and explain why they provide a stronger form of quantum security.
Attendance is mandatory
Hour: From 10:00h to 12:00h
Place: BLR & Online (Zoom)
THEORY LECTURE: Quantum Key Distribution (Part 3)
ICFO
The lectures start by explaining the standard protocols for quantum key distribution, and then discuss their security proofs and implementations. After presenting some of the hacking attacks on these protocols, we introduce the device-independent formalism and explain why they provide a stronger form of quantum security.
Attendance is mandatory