BB84 Updated 2025-07-16
Does not require entangled particles, unlike E91 which does.
en.wikipedia.org/w/index.php?title=Quantum_key_distribution&oldid=1079513227#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984) explains it well. Basically:
  • Alice and Bob randomly select a measurement basis of either 90 degrees and 45 degrees for each photon
  • Alice measures each photon. There are two possible results to either measurement basis: parallel or perpendicular, representing values 0 or 1. TODO understand better: weren't the possible results supposed to be pass or non-pass? She writes down the results, and sends the (now collapsed) photons forward to Bob.
  • Bob measures the photons and writes down the results
  • Alice and Bob communicate to one another their randomly chosen measurement bases over the unencrypted classic channel.
    This channel must be authenticated to prevent man-in-the-middle. The only way to do this authentication that makes sense is to use a pre-shared key to create message authentication codes. Using public-key cryptography for a digital signature would be pointless, since the only advantage of QKD is to avoid using public-key cryptography in the first place.
  • they drop all photons for which they picked different basis. The measurements of those which were in the same basis are the key. Because they are in the same basis, their results must always be the same in an ideal system.
  • if there is an eavesdropper on the line, the results of measurements on the same basis can differ.
    Unfortunately, this can also happen due to imperfections in the system.
    Alice and Bob must decide what level of error is above the system's imperfections and implies that an attacker is listening.
Bell's theorem Updated 2025-07-16
Basically a precise statement of "quantum entanglement is spooky".
Biconvex spherical lens Updated 2025-07-16
Each side is a sphere section. They don't have to have the same radius, they are still simple to understand with different radiuses.
The two things you have to have in mind that this does are:
Big O notation Updated 2025-07-16
Module bound above, possibly multiplied by a constant:
is defined as:
E.g.:
  • . For , is enough. Otherwise, any will do, the bottom line will always catch up to the top one eventually.
Bijection Updated 2025-07-16
Football Updated 2025-07-16
Football is a synonym for association football, can we be done with that! The word "soccer" is an aberration.
Bill Nye Updated 2025-07-16
Maybe we need these people, maybe we do.
The problem as with many well known science communicators is that he falls too much on the basic side of the the missing link between basic and advanced.
Video 1.
Bill Nye isn't really a Scientist (& why that shouldn't matter) by BobbyBroccoli (2017)
Source. Bobby's personal overview of Bill's carrier.
Binet (École Polytechnique) Updated 2025-07-16
TODO is there a publicly visible list?
Bisection (software engineering) Updated 2025-07-16
One of the Holiest age old debugging techniques!
The cool thing about bisection is that it is a brainless process: unlike when using a debugger, you don't have to understand anything about the system, and it incredibly narrows down the problem cause for you. Not having to think is great!
for loop Updated 2025-07-16
The for loop is a subcase of the while loop.
One theoretical motivation for its existence is that it has the fundamental property that we are immediately certain it will terminate, unlike while loops with arbitrary conditions.
Primitive recursive functions are the complexity class that divides those two.

There are unlisted articles, also show them or only show them.