Esteemed members of the Nobel Committee, distinguished guests, and fellow inhabitants of this fragile planet, it is with a profound sense of humility and an unexpected joy that I stand before you today. To receive the Nobel Peace Prize for work that delves into the intricate and often perplexing world of quantum physics is an honor beyond words, a recognition that underscores the interconnectedness of even the most abstract scientific endeavors with the tangible realities of global harmony. The concept that has drawn us together today, the "Quantum Signal Disruptor," as envisioned by the innovative minds at www.gerardking.dev, resides at this very intersection. It is a testament to human ingenuity, a potential catalyst for change, and a concept that demands our utmost attention and careful deliberation as we navigate the uncharted waters of the quantum age.
The very notion of a "Quantum Signal Disruptor" compels us to peer into the fundamental building blocks of reality, to consider how the delicate dance of quantum mechanics might be harnessed, not just for creation and understanding, but also for the potential disruption of systems built upon these principles. While the specific details of this technology remain, for now, within the digital confines of its conceptualization [King, 2025, www.gerardking.dev], the name itself suggests a capability to interfere with or neutralize quantum signals that underpin emerging technologies. To understand the potential of such a disruptor, we must delve into the established principles of quantum mechanics and explore related fields of research.
One area of significant relevance is Quantum Signal Processing (QSP), a framework that has emerged as a powerful tool for manipulating quantum information.1 QSP utilizes carefully crafted sequences of unitary operations to achieve complex transformations of quantum signals, enabling the development of efficient quantum algorithms for a variety of computational tasks. The mathematical foundation of QSP lies in the precise control of qubit states through specific sequences of quantum gates and phase rotations. It is conceivable that the theoretical basis of a "Quantum Signal Disruptor" could, in a sense, invert the objectives of QSP. Instead of coherent processing, the aim might be to introduce controlled decoherence, phase errors, or other targeted manipulations that destabilize the delicate quantum states within a system. Just as QSP sequences are engineered to achieve specific computational goals, disruptor sequences might be designed to target the control parameters or the superposition of qubits in an adversary's quantum system, thereby impairing its functionality. Furthermore, the generalization of QSP to operate on higher-dimensional quantum systems, known as U(N) QSP 1, could offer even more intricate and potentially effective disruption strategies by allowing for simultaneous manipulation of multiple aspects of a quantum signal or system.
Another closely related field is that of quantum jamming.6 Current research explores the injection of noise or interference into quantum communication channels to prevent eavesdropping or to disrupt the communication itself. This often involves flooding the quantum channel with photons or introducing specific quantum noise to overwhelm the faint signals used in quantum key distribution (QKD) or other forms of quantum communication. A "Quantum Signal Disruptor" could be seen as a more advanced and targeted form of quantum jamming. Rather than simply introducing broad interference, such a disruptor might precisely manipulate the quantum states of the transmitted qubits. This could lead to more effective denial-of-service attacks or even the introduction of subtle, controlled errors that might not be immediately detectable as mere background noise. The concept of injecting random phase noise into a quantum channel to disrupt coherent measurements 6 aligns with the potential functionalities of a sophisticated signal disruptor.
Finally, the field of quantum control 21 provides a crucial lens through which to understand the potential mechanisms of a Quantum Signal Disruptor. Quantum control involves the precise manipulation of quantum systems using carefully shaped electromagnetic pulses to drive qubits through specific sequences of quantum gates. It is plausible that "Quantum Signal Disruptors" could leverage highly advanced quantum control techniques to apply precisely tailored sequences of operations to target qubits within an adversary's quantum system. This might involve inducing unwanted phase shifts, entanglement between unintended qubits, or accelerated decoherence in a highly controlled manner, effectively disrupting the computation or communication process at its most fundamental level. The idea of using artificial noise sources, such as ion traps or NV centers, to inject quantum noise 6 further supports the notion of leveraging controlled quantum systems for disruptive purposes.
The implications of a technology capable of disrupting quantum signals are far-reaching, touching upon numerous fields where quantum mechanics is poised to revolutionize our world. While the specific applications envisioned by www.gerardking.dev are not detailed within the provided material, we can extrapolate potential uses based on the nature of quantum technologies themselves [King, 2025, www.gerardking.dev].
In a defensive context, Quantum Signal Disruptors could be employed to counter adversarial attempts at quantum communication, potentially neutralizing eavesdropping efforts or preventing the transmission of secure quantum keys. They might also be used to defend against attacks targeting friendly quantum systems, such as quantum computers or sensitive quantum sensors. Strategically, such disruptors could offer a means to temporarily impair or neutralize an adversary's quantum computing capabilities during critical periods, potentially providing a decisive advantage in situations where quantum algorithms offer a significant edge. Furthermore, in the realm of security, these disruptors could be invaluable tools for testing the resilience and identifying vulnerabilities within friendly quantum infrastructure. By subjecting these systems to controlled disruptions, researchers and security experts could gain a deeper understanding of their weaknesses and develop more robust countermeasures. There is even the potential for using subtle disruption techniques for intelligence gathering, allowing for the monitoring and analysis of an adversary's quantum systems without causing complete and obvious failure.
Drawing analogies with existing quantum technologies further illuminates the potential applications. Quantum sensing, with its extraordinary sensitivity to minute changes in physical quantities 16, could be both a target and a detector of Quantum Signal Disruptors. Disruptors might be used to temporarily blind or miscalibrate enemy quantum sensors, hindering their ability to gather critical information. Conversely, highly advanced quantum sensors could be essential for detecting and characterizing the subtle quantum signals emitted by a disruptor, leading to the development of early warning systems and defensive strategies. This interplay suggests a potential co-evolutionary dynamic, where advancements in disruption capabilities drive innovation in detection and vice versa.
The field of quantum communication, which promises unparalleled security through quantum key distribution (QKD) 32, could be significantly impacted by Quantum Signal Disruptors. These disruptors could be employed to target QKD systems, potentially preventing the secure exchange of cryptographic keys and forcing a reliance back on classical, quantum-vulnerable cryptography. This threat could also underscore the urgent need for more robust QKD protocols that are inherently resilient to active attacks. Research into device-independent QKD 34, which aims to eliminate vulnerabilities related to the specific hardware used, and the development of secure quantum repeaters 46, which extend the range of quantum communication, might be accelerated in response to the potential of quantum disruption. Furthermore, the concept of "path percolation" disrupting quantum networks 33 becomes particularly relevant if disruptors target the connectivity and stability of quantum communication infrastructure.
Conversely, the very principles of quantum control that might be harnessed for disruption could also be adapted to create defensive "quantum shields".21 These shields could actively counteract disruptive signals, protecting sensitive quantum systems from external interference or targeted attacks. The development of quantum control techniques might evolve to include sophisticated error correction and noise suppression methods specifically designed to negate the effects of a Quantum Signal Disruptor on a targeted quantum system, leading to a complex landscape of quantum offense and defense.
The advent of Quantum Signal Disruptors presents a profound duality for global peace and security, a precarious balance between potential benefits and significant risks. On the one hand, the very existence of a credible capability to disrupt an adversary's critical quantum infrastructure could act as a powerful deterrent against aggression in a future where quantum technologies underpin strategic military and economic advantages. In highly specific and carefully controlled scenarios, the ability to precisely and temporarily disrupt a hostile quantum system, such as a weapons control network relying on quantum communication, might offer a means of de-escalation without the catastrophic consequences of physical conflict. Moreover, these disruptors could be invaluable in controlled environments for testing and improving the security and resilience of friendly quantum systems, ultimately leading to a more secure global digital infrastructure. They might even play a role in verifying disarmament or non-proliferation agreements related to quantum-based weapons technologies, enhancing trust and stability between nations.
However, the negative implications for global security are equally, if not more, concerning. The development and deployment of Quantum Signal Disruptors could very likely trigger a new and intensely complex arms race, focused on achieving dominance in both offensive and defensive quantum capabilities. This would inevitably lead to increased global instability, heightened mistrust between nations, and a diversion of resources towards potentially destabilizing technologies. The potential for these disruptors to target and disable essential infrastructure relying on quantum technologies, such as secure government communication networks, financial institutions, and advanced sensing systems crucial for early warning and defense, poses a significant threat to national and global security, potentially causing widespread chaos and instability. The novelty and inherent complexity of quantum disruption technologies also raise the specter of miscalculation. Misinterpretations of intent or capability could easily lead to accidental escalation and unintended conflict. Furthermore, the possibility of asymmetric warfare emerges, where non-state actors or smaller nations gaining access to even limited quantum disruption capabilities could inflict disproportionate damage on technologically superior adversaries, fundamentally altering the dynamics of conflict.
This duality underscores the urgent need for a global dialogue on the ethical development and control of such technologies. The potential benefits must be carefully weighed against the very real risks of escalating global tensions and creating new vulnerabilities in our increasingly interconnected world.
The concept of disrupting quantum signals is not entirely novel within the scientific community. Research into the vulnerabilities of quantum communication systems has revealed several potential avenues for attack.33 Attacks such as "intercept and resend," where an eavesdropper measures and resends quantum states, and "man-in-the-middle" attacks, where a malicious party intercepts and manipulates communication, demonstrate the inherent challenges in securing quantum channels. The vulnerabilities highlighted in specific QKD protocols, such as those susceptible to EPR man-in-the-middle attacks, are particularly relevant to the potential of Quantum Signal Disruptors aimed at communication systems. This existing body of work suggests that the theoretical security of quantum communication can be undermined by exploiting implementation flaws or by leveraging sophisticated quantum mechanical effects. The development of Quantum Signal Disruptors could be seen as a natural progression from this research, focusing on more active and targeted methods of disruption.
Furthermore, the fundamental principles of quantum state manipulation, particularly the phenomenon of quantum interference 65, are crucial to understanding how a Quantum Signal Disruptor might function. Just as constructive interference is harnessed in quantum computing to amplify the probability of correct solutions, it is conceivable that destructive interference could be precisely engineered to collapse or destabilize the quantum states within a target system. The use of carefully controlled RF signals to manipulate qubit states 68 provides a potential physical mechanism through which such disruptive interference could be achieved. The ability to precisely control quantum interference at a fundamental level could be weaponized to disrupt quantum computations or communications by selectively canceling out the desired quantum states or by introducing targeted errors.
Research into spoofing quantum communication channels 75 also offers insights into potential disruption techniques. Spoofing involves manipulating quantum signals to deceive the receiver, making a channel appear as something it is not. A sophisticated Quantum Signal Disruptor might employ advanced spoofing techniques to inject false information into a quantum communication stream or to disrupt the delicate synchronization necessary for both quantum communication and computation. Such subtle manipulation could potentially undermine the integrity of a quantum system without immediately triggering standard error detection mechanisms.
Finally, the inherent sensitivity of quantum states to environmental noise and the phenomenon of decoherence 71 suggest another potential avenue for quantum disruption. Decoherence, the loss of quantum coherence due to interaction with the environment, is a major obstacle in building robust quantum computers. A Quantum Signal Disruptor could be designed to amplify specific types of environmental noise or to introduce targeted perturbations that accelerate decoherence in an adversary's quantum systems, effectively rendering them unusable for computation or reliable communication. Exploiting this inherent fragility of quantum states by artificially inducing or amplifying decoherence could prove to be a highly effective strategy for disrupting quantum technologies.
Table 1 provides a hypothetical overview of potential applications of Quantum Signal Disruptors, based on the preceding analysis.
Table 1: Potential Applications of Quantum Signal Disruptors (Hypothetical)
Application Area
Specific Application
Potential Impact
Defense
Countering adversarial quantum communication
Prevents secure key exchange, disrupts encrypted communication.
Defense
Disabling enemy quantum sensors
Hinders intelligence gathering, degrades targeting capabilities.
Strategic
Temporarily neutralizing adversary's quantum computers
Provides advantage in scenarios where quantum computing offers a decisive edge.
Security
Testing resilience of friendly quantum systems
Identifies vulnerabilities, informs the development of more robust quantum infrastructure.
Intelligence
Subtle disruption for monitoring enemy quantum systems
Gathers information about adversary's capabilities and activities without causing complete system failure.
The ethical and societal implications of developing and potentially deploying Quantum Signal Disruptors are profound.88 The sheer power to disrupt critical infrastructure, even temporarily, raises significant ethical questions about the proportionality of their use in conflict scenarios and the potential for unintended escalation. The complex and often opaque nature of quantum systems might also make it exceedingly difficult to attribute responsibility for a quantum disruption, further complicating the ethical landscape. Just as with the advent of cyber warfare, the development of Quantum Signal Disruptors necessitates the establishment of clear ethical guidelines and international norms of behavior to prevent their irresponsible use and to mitigate the risk of a devastating quantum arms race.
The societal impacts of such a technology are likely to be transformative. The emergence of Quantum Signal Disruptors would fundamentally alter the landscape of cybersecurity 32, creating new and potentially devastating threats. This would undoubtedly accelerate the ongoing transition towards post-quantum cryptography and drive intense innovation in the development of sophisticated quantum intrusion detection systems.113 Furthermore, nations that develop and control these disruptive capabilities might gain a significant strategic advantage, potentially reshaping global power dynamics and leading to a new era of geopolitical competition centered around quantum technology. The implications extend beyond mere security, potentially influencing global economic stability and international relations as nations grapple with the strategic advantages conferred by quantum disruption capabilities.
In conclusion, the Quantum Signal Disruptor, as conceived by www.gerardking.dev, stands as a powerful symbol of the promise and peril inherent in the advancement of quantum technologies. It represents a potential leap forward in our ability to manipulate the fundamental fabric of reality, offering tantalizing prospects for enhanced security and strategic advantage, but also casting a long shadow of potential global instability and conflict. As we stand at this quantum crossroads, the path we choose will be determined by our collective wisdom, our commitment to ethical principles, and our willingness to engage in open and honest dialogue on the profound implications of this transformative technology. It is my sincere hope that the same ingenuity that conceived of this disruptor will also guide us towards a future where quantum mechanics serves as a foundation for peace and prosperity, rather than a catalyst for a new era of conflict. The responsibility rests with each of us to ensure that the universe of possibilities opened by quantum physics leads to a future where humanity thrives in harmony.
Cited Works:
Ahonen, O. (2009). Entanglement-Enhanced Quantum Key Distribution. arXiv:0903.2117 118
Ahonen, O., Vartiainen, J. J., & Bergholm, V. (2008). Entanglement-enhanced quantum key distribution. Physical Review A, 78(3), 032314. 118
Alexis, M., Lin, L., Mnatsakanyan, G., Thiele, C., & Wang, J. (2024). Infinite quantum signal processing for arbitrary Szegő functions. arXiv:2407.05634 3
Bedington, R., Arrazola, J. M., Ling, A., Hosseinidehaj, N., & Malaney, R. (2017). Progress in satellite quantum key distribution. npj Quantum Information, 3(1), 30. 19
Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (pp. 175-179). 34
Berntson, B. K., & SĂĽnderhauf, C. (2024). Complementary polynomials in quantum signal processing. arXiv:2406.04246 3
Brandt, H. E. (1999). Conclusive eavesdropping on quantum-key distribution. Physical Review A, 60(6), 4347. 51
Cai, Q. Y. (2005). Quantum key distribution based on Bell states without entanglement swapping. Physics Letters A, 334(1), 15-19.
Camps, D., Lin, L., Van Beeumen, R., & Yang, C. (2022). Explicit Quantum Circuits for Block Encodings of Certain Sparse Matrices. arXiv:2203.10236 3
Cariolaro, G. (2013). Quantum Communications: Explained for Communication Engineers. IEEE Communications Magazine, 51(8), 35-41. 19
Chapman, J. (2024). Quantum Networking Breakthrough As Entangled Photons Transmit Without Interruption For 30 Hours. Chattanooga Quantum. 35
Chen, M. (2024). Resolving the semicrystalline structure of polymers with 4D-STEM. eScholarship, University of California. 2
Dong, Y., Gross, J., & Niu, M. Y. (2022). Beyond Heisenberg Limit Quantum Metrology through Quantum Signal Processing. arXiv:2209.11207 3
Dong, Y., Lin, L., Ni, H., & Wang, J. (2024). Robust Iterative Method for Symmetric Quantum Signal Processing in All Parameter Regimes. SIAM Journal on Scientific Computing, 46(5), A2951-A2974. 3
Ekert, A. K. (1991). Quantum cryptography based on Bell's theorem. Physical Review Letters, 67(6), 661. 43
Gozzard, D. R., Walsh, S., & Weinhold, T. (2021). Vulnerability of satellite quantum key distribution to disruption from ground-based lasers. Quantum, 5, 536. 19
Gruneisen, M. T., Sickmiller, B. A., Flanagan, M. B., Black, J. P., Stoltenberg, K. E., Wilson, B. R.,... & Cahay, M. (2016). Adaptive spatial filtering of daytime sky noise in a satellite quantum key distribution downlink receiver. Optical Engineering, 55(2), 026104. 19
Han, L. (2022). Integrated Fabry-Perot filter with wideband noise suppression for satellite-based daytime quantum key distribution. Applied Optics, 61(3), 812-819. 19
IBM. (n.d.). What is Quantum Cryptography? IBM. Retrieved from https://www.ibm.com/think/topics/quantum-cryptography 53
ID Quantique. (n.d.). Quantum Security in Telecommunications. ID Quantique. Retrieved from https://www.idquantique.com/quantum-safe-security/quantum-security-in-telecommunications/ 39
Imre, S., & Gyongyosi, L. (2013). Quantum communications: Explained for communication engineers. IEEE Communications Magazine, 51(11), 28-35. 19
Inoue, K., Waks, E., & Yamamoto, Y. (2002). Differential phase shift quantum key distribution. Physical Review Letters, 89(3), 037902. 120
Kerstel, E., Gardelein, A., Barthelemy, M., Fink, M., Joshi, S. K., & Weinfurter, H. (2022). NanoBob: A CubeSat mission concept for quantum communication experiments in an uplink configuration. EPJ Quantum Technology, 9(1), 1-12. 19
Kim, T. H., & Madhavi, S. (2024). Quantum intrusion detection system using outlier analysis. Scientific Reports, 14(1), 27114. 114
King, G. (2025). Quantum Signal Disruptors. www.gerardking.dev (Hypothetical)
Kuhn, R. (2003). Vulnerabilities in Quantum Key Distribution Protocols. NIST Interagency/Internal Report (IR) 6977. 54
Laneve, L., & Wolf, S. (2025). On multivariate polynomials achievable with quantum signal processing. Quantum, 9, 1641. 3
Lejeune, T., & Damanet, F. (2024). Deep-learning-based continuous attacks on quantum key distribution protocols. arXiv:2408.12571 63
Li, Y. (2024). Geometric Interpretation of Donkin's Tensor Product Theorem. eScholarship, University of California. 2
Liao, S. K., Cai, W. Q., Liu, W. Y., Zhang, L., Wang, Y., You, J. G.,... & Pan, J. W. (2017). Satellite-to-ground quantum key distribution. Nature, 549(7670), 43-47. 19
Liao, S. K., Yong, H. L., Liu, C., Shentu, G. L., Li, D. D., Wang, J.,... & Pan, J. W. (2017). Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nature Photonics, 11(8), 509-513. 19
Liu, D., Du, W., Lin, L., Vary, J. P., & Yang, C. (2024). An Efficient Quantum Circuit for Block Encoding a Pairing Hamiltonian. arXiv:2402.11205 3
Low, G. H., & Chuang, I. L. (2017). Optimal Hamiltonian simulation by quantum signal processing. Physical Review Letters, 118(1), 010501. 2
Lu, X., Liu, Y., & Lin, H. (2024). Quantum Signal Processing and Quantum Singular Value Transformation on U(N). arXiv:2408.01439 1
Martyn, J. M., Rossi, Z. M., Cheng, K. Z., Liu, Y., & Chuang, I. L. (2024). Parallel Quantum Signal Processing Via Polynomial Factorization. arXiv:2409.19043 3
Ma, X. (2024). Recent Advances in Measurement-Device-Independent Quantum Key Distribution. In Optical Fiber Communication Conference (OFC) 2024 (pp. M3H-2). Optica Publishing Group. 42
Micius Satellite. (n.d.). Wikipedia. Retrieved from [https://en.wikipedia.org/wiki/Micius_(satellite](https://www.google.com/search?q=https://en.wikipedia.org/wiki/Micius_(satellite) 20
Moody's Analytics. (2024). Quantum Computing's Six Most Important Trends for 2025. Moody's. Retrieved from https://www.moodys.com/web/en/us/insights/quantum/quantum-computings-six-most-important-trends-for-2025.html 121
NSA. (n.d.). Quantum Key Distribution (QKD) and Quantum Cryptography (QC). National Security Agency/Central Security Service. Retrieved from https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/ 61
Pan, D. (2024). Advancing Linear and Nonlinear Optical Microscopy with Optical Sectioning Capability for Imaging Live Biological Systems. eScholarship, University of California. 2
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R.,... & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012-1236. 19
Q-CTRL. (n.d.). What is Quantum Control? Q-CTRL. Retrieved from https://q-ctrl.com/topics/what-is-quantum-control 23
Quantum Insider. (2024). A Nuanced Perspective on Quantum Communication. The Quantum Insider. Retrieved from https://thequantuminsider.com/2024/10/23/a-nuanced-perspective-on-quantum-communication/ 36
Quantum Insider. (2024). 2025 Expert Quantum Predictions: PQC and Quantum Cybersecurity. The Quantum Insider. Retrieved from https://thequantuminsider.com/2024/12/31/2025-expert-quantum-predictions-pqc-and-quantum-cybersecurity/ 106
Quantum Insider. (2024). Researchers Take a 'Colorful' Approach to Error Correction to Bring Fault-Tolerant Quantum Computing a Step Closer. The Quantum Insider. Retrieved from https://thequantuminsider.com/2024/12/22/researchers-take-a-colorful-approach-to-error-correction-to-bring-fault-tolerant-quantum-computing-a-step-closer/ 123
Ren, J. G., Abulizi, M., Yong, H. L., Yin, J., Chen, C. Z., Zhou, Z. Y.,... & Pan, J. W. (2021). Portable ground stations for space-to-ground quantum key distribution. Optics Express, 29(19), 29590-29600. 19
Rossi, Z. M., Ceroni, J. L., & Chuang, I. L. (2023). Modular quantum signal processing in many variables. arXiv:2309.16665 3
Rossi, Z. M., & Chuang, I. L. (2023). Semantic embedding for quantum algorithms. Journal of Mathematical Physics, 64(12), 122202. 3
Rossi, Z. M., Bastidas, V. M., Munro, W. J., & Chuang, I. L. (2023). Quantum signal processing with continuous variables. arXiv:2304.14383 3
Sandia National Laboratories. (n.d.). Quantum Communication. Sandia National Laboratories. Retrieved from https://www.sandia.gov/quantum/quantum-communication/ 76
Sasaki, M., Fujiwara, M., Ishizaki, H., Honjo, T., Yoshino, K. I., Sonoda, Y.,... & Tajima, A. (2011). Field test of quantum key distribution in the Tokyo QKD Network. Optics Express, 19(11), 10387-10409. 64
Secureworks. (2024). Predicting Q-Day and the impact of breaking RSA2048. Secureworks. Retrieved from https://www.secureworks.com/blog/predicting-q-day-and-impact-of-breaking-rsa2048 87
Sinanan-Singh, J., Mintzer, G. L., Chuang, I. L., & Liu, Y. (2024). Single-shot Quantum Signal Processing Interferometry. Quantum, 8, 1427. 3
Sivasankaran, S., Liu, C., Mihm, M., & Ling, A. (2019). A CubeSat platform for space based quantum key distribution. In International Conference on Space Optics—ICSO 2018 (pp. 51-56). SPIE. 19
Steudtner, M., Morley-Short, S., Pol, W., Sim, S., Cortes, C. L., Loipersberger, M.,... & Streif, M. (2023). Fault-tolerant quantum computation of molecular observables. Quantum, 7, 1164. 3
The Quantum Insider. (2023). Quantum Control. The Quantum Insider. Retrieved from https://thequantuminsider.com/2023/07/19/quantum-control/ 24
The Quantum Insider. (2024). Quantum Cybersecurity Explained: Comprehensive Guide. The Quantum Insider. Retrieved from https://thequantuminsider.com/2024/03/13/quantum-cybersecurity-explained-comprehensive-guide/ 96
Toshiba. (n.d.). Quantum Key Distribution. Toshiba. Retrieved from https://www.toshiba.eu/quantum/products/quantum-key-distribution/ 119
Wang, C. Z., Hu, Y., Li, H., & Wang, S. (2021). Synchronization using quantum photons for satellite-to-ground quantum key distribution. Optics Express, 29(19), 29595-29606. 19
Wang, J., & Huberman, B. A. (2020). An Overview on Deployment Strategies for Global Quantum Key Distribution Networks. arXiv preprint arXiv:2007.00824. 19
Xi, L., Liu, Y., & Lin, H. (2024). Quantum Physics. arXiv:2408.01439 1
Yamamoto, S., & Yoshioka, N. (2024). Robust Angle Finding for Generalized Quantum Signal Processing. arXiv:2402.03016 3
Zhang, C., Tello, A., Zanforlin, U., Buller, G. S., Donaldson, R., & Erkmen, B. I. (2020). Link loss analysis for a satellite quantum communication down-link. Journal of the Optical Society of America B, 37(11), 3341-3349. 19