related words |
chords |
sealing |
nordholt |
breeding |
achievability |
attacker |
tamaki |
vernam |
sifting |
untagged |
decrypt |
unassisted |
cheaters |
password |
adversarys |
authenticate |
decryption |
cryptosystem |
bessette |
cheater |
|
related documents |
Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
Quantum cloning with continuous variables [0210061v1] |
Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed
States [0611145v1] |
Symplectic invariants, entropic measures and correlations of Gaussian
states [0307073v4] |
Semiclassical analysis of Wigner $3j$-symbol [0703104v1] |
Lower bounds on the entanglement of formation for general Gaussian states [0307023v2] |
Optimal cloning of mixed Gaussian states [0605161v2] |
Entanglement and Bell Inequalities [0407199v2] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
|
related topics |
{key, protocol, security} |
{state, states, entangled} |
{phase, path, phys} |
{group, space, representation} |
{particle, mechanics, theory} |
{state, states, coherent} |
{energy, gaussian, time} |
{bell, inequality, local} |
{information, entropy, channel} |
{cos, sin, state} |
{alice, bob, state} |
{states, state, optimal} |
{error, code, errors} |
{state, phys, rev} |
{let, theorem, proof} |
{photon, photons, single} |
{measurement, state, measurements} |
{spin, pulse, spins} |
{entanglement, phys, rev} |
{equation, function, exp} |
|