Last update: Thu Oct 18 02:01:17 MDT 2018
@Article{Folger:2016:TQH, author = "Tim Folger", title = "Technology: The Quantum Hack", journal = j-SCI-AMER, volume = "314", number = "2", pages = "48--55", month = feb, year = "2016", CODEN = "SCAMAC", DOI = "https://doi.org/10.1038/scientificamerican0216-48", ISSN = "0036-8733 (print), 1946-7087 (electronic)", ISSN-L = "0036-8733", bibdate = "Tue Mar 8 06:46:07 MST 2016", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/sciam2010.bib; http://www.nature.com/scientificamerican", URL = "http://www.nature.com/scientificamerican/journal/v314/n2/full/scientificamerican0216-48.html; http://www.nature.com/scientificamerican/journal/v314/n2/pdf/scientificamerican0216-48.pdf", acknowledgement = ack-nhfb, fjournal = "Scientific American", journal-URL = "http://www.nature.com/scientificamerican", keywords = "quantum cryptography", }