Computação Quântica Aula 19: Entenda a Criptografia Quântica e Distribuição de Chaves 🔐
Explore os fundamentos da criptografia quântica e a distribuição de chaves quânticas, com referências a Einstein e outros pioneiros. Aprenda como a computação quântica revoluciona a segurança da informação!

Aranea Science
37 views • Aug 29, 2025

About this video
Referências:
Einstein, Albert, Boris Podolsky, and Nathan Rosen. "Can quantum-mechanical description of physical reality be considered complete?." Physical review 47.10 (1935): 777.
Heisenberg, W. "On the quantum-theoretical reinterpretation of kinematical and mechanical relationships." Z. Physik 33 (1925): 879-893.
Schrödinger, Erwin. "An undulatory theory of the mechanics of atoms and molecules." Physical review 28.6 (1926): 1049.
Wiesner, Stephen. "Conjugate coding." ACM Sigact News 15.1 (1983): 78-88.
Bell, John S. "On the einstein podolsky rosen paradox." Physics Physique Fizika 1.3 (1964): 195.
Freedman, Stuart J., and John F. Clauser. "Experimental test of local hidden-variable theories." Physical review letters 28.14 (1972): 938.
Benioff, Paul. "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines." Journal of statistical physics 22.5 (1980): 563-591.
Birkhoff, Garrett, and John Von Neumann. "The logic of quantum mechanics." The Logico-Algebraic Approach to Quantum Mechanics: Volume I: Historical Evolution. Dordrecht: Springer Netherlands, 1975. 1-26.
Dieks, D. G. B. J. "Communication by EPR devices." Physics Letters A 92.6 (1982): 271-272.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H., et al. "Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels." Physical review letters 70.13 (1993): 1895.
Calderbank, A. Robert, and Peter W. Shor. "Good quantum error-correcting codes exist." Physical Review A 54.2 (1996): 1098.
Cao, Yuan, et al. "The evolution of quantum key distribution networks: On the road to the qinternet." IEEE Communications Surveys & Tutorials 24.2 (2022): 839-894.
Fei, Yang-Yang, et al. "Quantum man-in-the-middle attack on the calibration process of quantum key distribution." Scientific reports 8.1 (2018): 4283.
Imagens usadas:
Fröhlich, Bernd, et al. "Quantum secured gigabit optical access networks." Scientific reports 5.1 (2015): 18121.
Bhatia, Ashutosh, Sainath Bitragunta, and Kamlesh Tiwari. "PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation." IEEE Open Journal of the Communications Society (2025).
#economia #ciencia #tecnologia #fisicaquantica #física
Einstein, Albert, Boris Podolsky, and Nathan Rosen. "Can quantum-mechanical description of physical reality be considered complete?." Physical review 47.10 (1935): 777.
Heisenberg, W. "On the quantum-theoretical reinterpretation of kinematical and mechanical relationships." Z. Physik 33 (1925): 879-893.
Schrödinger, Erwin. "An undulatory theory of the mechanics of atoms and molecules." Physical review 28.6 (1926): 1049.
Wiesner, Stephen. "Conjugate coding." ACM Sigact News 15.1 (1983): 78-88.
Bell, John S. "On the einstein podolsky rosen paradox." Physics Physique Fizika 1.3 (1964): 195.
Freedman, Stuart J., and John F. Clauser. "Experimental test of local hidden-variable theories." Physical review letters 28.14 (1972): 938.
Benioff, Paul. "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines." Journal of statistical physics 22.5 (1980): 563-591.
Birkhoff, Garrett, and John Von Neumann. "The logic of quantum mechanics." The Logico-Algebraic Approach to Quantum Mechanics: Volume I: Historical Evolution. Dordrecht: Springer Netherlands, 1975. 1-26.
Dieks, D. G. B. J. "Communication by EPR devices." Physics Letters A 92.6 (1982): 271-272.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.
Bennett, Charles H., et al. "Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels." Physical review letters 70.13 (1993): 1895.
Calderbank, A. Robert, and Peter W. Shor. "Good quantum error-correcting codes exist." Physical Review A 54.2 (1996): 1098.
Cao, Yuan, et al. "The evolution of quantum key distribution networks: On the road to the qinternet." IEEE Communications Surveys & Tutorials 24.2 (2022): 839-894.
Fei, Yang-Yang, et al. "Quantum man-in-the-middle attack on the calibration process of quantum key distribution." Scientific reports 8.1 (2018): 4283.
Imagens usadas:
Fröhlich, Bernd, et al. "Quantum secured gigabit optical access networks." Scientific reports 5.1 (2015): 18121.
Bhatia, Ashutosh, Sainath Bitragunta, and Kamlesh Tiwari. "PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation." IEEE Open Journal of the Communications Society (2025).
#economia #ciencia #tecnologia #fisicaquantica #física
Video Information
Views
37
Likes
4
Duration
46:28
Published
Aug 29, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.