Computação Quântica Aula 19: Entenda a Criptografia Quântica e Distribuição de Chaves 🔐

Explore os fundamentos da criptografia quântica e a distribuição de chaves quânticas, com referências a Einstein e outros pioneiros. Aprenda como a computação quântica revoluciona a segurança da informação!

Computação Quântica Aula 19: Entenda a Criptografia Quântica e Distribuição de Chaves 🔐
Aranea Science
37 views • Aug 29, 2025
Computação Quântica Aula 19: Entenda a Criptografia Quântica e Distribuição de Chaves 🔐

About this video

Referências:

Einstein, Albert, Boris Podolsky, and Nathan Rosen. "Can quantum-mechanical description of physical reality be considered complete?." Physical review 47.10 (1935): 777.

Heisenberg, W. "On the quantum-theoretical reinterpretation of kinematical and mechanical relationships." Z. Physik 33 (1925): 879-893.

Schrödinger, Erwin. "An undulatory theory of the mechanics of atoms and molecules." Physical review 28.6 (1926): 1049.

Wiesner, Stephen. "Conjugate coding." ACM Sigact News 15.1 (1983): 78-88.

Bell, John S. "On the einstein podolsky rosen paradox." Physics Physique Fizika 1.3 (1964): 195.

Freedman, Stuart J., and John F. Clauser. "Experimental test of local hidden-variable theories." Physical review letters 28.14 (1972): 938.

Benioff, Paul. "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines." Journal of statistical physics 22.5 (1980): 563-591.

Birkhoff, Garrett, and John Von Neumann. "The logic of quantum mechanics." The Logico-Algebraic Approach to Quantum Mechanics: Volume I: Historical Evolution. Dordrecht: Springer Netherlands, 1975. 1-26.

Dieks, D. G. B. J. "Communication by EPR devices." Physics Letters A 92.6 (1982): 271-272.

Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.

Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.

Bennett, Charles H. "Logical reversibility of computation." IBM journal of Research and Development 17.6 (1973): 525-532.

Bennett, Charles H., et al. "Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels." Physical review letters 70.13 (1993): 1895.

Calderbank, A. Robert, and Peter W. Shor. "Good quantum error-correcting codes exist." Physical Review A 54.2 (1996): 1098.

Cao, Yuan, et al. "The evolution of quantum key distribution networks: On the road to the qinternet." IEEE Communications Surveys & Tutorials 24.2 (2022): 839-894.

Fei, Yang-Yang, et al. "Quantum man-in-the-middle attack on the calibration process of quantum key distribution." Scientific reports 8.1 (2018): 4283.

Imagens usadas:

Fröhlich, Bernd, et al. "Quantum secured gigabit optical access networks." Scientific reports 5.1 (2015): 18121.

Bhatia, Ashutosh, Sainath Bitragunta, and Kamlesh Tiwari. "PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation." IEEE Open Journal of the Communications Society (2025).
#economia #ciencia #tecnologia #fisicaquantica #física

Video Information

Views

37

Likes

4

Duration

46:28

Published

Aug 29, 2025

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.