
RFC 9340 - Architectural Principles for a Quantum Internet
Quantum Information Vol. 8, 121, DOI 10.4121/16912522, October 2022, <https://www.nature.com/articles/s41534-022-00631-2>. [QI-Scenarios] Wang, C., Rahman, …
Quantum Internet Research Group (qirg)
RFC 9583 Application Scenarios for the Quantum Internet 2024-06 Informational RFC Related Internet-Drafts and RFCs (2 hits) 28 pages draft-lopez-qirg-qi-multiplane-arch-05 A Multiplane …
Packet-Switched Quantum Networks As a first step, we explore the possibility of performing packet switching in quantum networks and bring to light some of the main challenges for doing …
A Multiplane Architecture Proposal for the Quantum Internet
Oct 19, 2025 · A consistent reference architecture model for the Quantum Internet is required to progress in its evolution, providing a framework for the integration of the protocols applicable …
RFC 9583 - Application Scenarios for the Quantum Internet
Quantum Network", Work in Progress, Internet-Draft, draft- van-meter-qirg-quantum-connection-setup-01, 11 September 2019, <https://datatracker.ietf.org/doc/html/draft-van- meter-qirg …
Applications and Use Cases for the Quantum Internet
For example, applications may be classified as quantum computing, quantum meteorology, quantum chemistry, quantum cryptography, etc. This is a valid and useful classification scheme.
Agenda IETF124: qirg
Nov 3, 2025 · The QNCP aims to provide a robust framework for distributed quantum network operations, supporting the evolution of control needs from a local quantum network with …
Post-Quantum Cryptography for Engineers draft-ietf-pquip-pqc …
This document does not cover unrelated technologies like quantum key distribution (QKD) or quantum key generation, which use quantum hardware to exploit quantum effects to protect …
Quantum Internet Research Group (qirg)
Whilst quantum networks operate on a completely new set of physical principles, many lessons have been learned throughout the Internet's history and many of them will be relevant to the …
Post-Quantum Use In Protocols (pquip)
Some IETF protocols rely upon cryptographic mechanisms that are considered secure given today’s “classical computers” but would be vulnerable to attacks by a Cryptographically …