This report discusses how quantum computing poses a threat to communications security and what steps can be taken to mitigate this using quantum key distribution.

A subscription is required to view this content.

Already subscribed? Continue Continue