Where every claim in SecProve
comes from.
A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.
Standards for QKD deployment: interfaces, security proofs, network architecture. The main standardization effort for quantum networking.
Test your knowledge · D5European Telecommunications Standards Institute guide to quantum key distribution. Covers BB84, E91, and practical deployment considerations.
Test your knowledge · D5DOE's blueprint for a quantum internet. Five milestones from verification of entanglement to fault-tolerant quantum networking. Questions on quantum network architecture and its security properties.
Test your knowledge · D5The first quantum key distribution (QKD) protocol. Foundational for all quantum networking questions. Security based on quantum mechanics (no-cloning theorem, measurement disturbance).
Test your knowledge · D5Entanglement-based QKD. Security based on Bell inequality violations. Compare/contrast with BB84 for protocol design questions.
Test your knowledge · D5Six stages of quantum internet development from trusted repeater to full quantum computing network. Defines the maturity model for quantum networking questions.
Test your knowledge · D5Ready to test what you've learned?
Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.