no code implementations • 9 Sep 2020 • Saiful Islam Salim, Adnan Quaium, Sriram Chellappan, A. B. M. Alim Al Islam
Then, using the qubits with maximal entanglement, we send the modified encryption key to the receiver.
Cryptography and Security