Nov. 29, 2022, 2:10 a.m. | Michel Boyer, Gilles Brassard, Nicolas Godbout, Rotem Liss, Stéphane Virally

cs.CR updates on arXiv.org arxiv.org

Quantum key distribution (QKD) protocols aim at allowing two parties to
generate a secret shared key. While many QKD protocols have been proven
unconditionally secure in theory, practical security analyses of experimental
QKD implementations typically do not take into account all possible loopholes,
and practical devices are still not fully characterized for obtaining tight and
realistic key rates. We present a simple method of computing secure key rates
for any practical implementation of discrete-variable QKD (which can also apply
to …

distribution key quantum quantum key distribution qubit security simple single

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC