| related words |
| chords |
| sealing |
| nordholt |
| breeding |
| achievability |
| attacker |
| tamaki |
| vernam |
| sifting |
| untagged |
| decrypt |
| unassisted |
| cheaters |
| password |
| adversarys |
| authenticate |
| decryption |
| cryptosystem |
| bessette |
| cheater |
|
| related documents |
| Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
| Quantum cloning with continuous variables [0210061v1] |
| Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed
States [0611145v1] |
| Symplectic invariants, entropic measures and correlations of Gaussian
states [0307073v4] |
| Semiclassical analysis of Wigner $3j$-symbol [0703104v1] |
| Lower bounds on the entanglement of formation for general Gaussian states [0307023v2] |
| Optimal cloning of mixed Gaussian states [0605161v2] |
| Entanglement and Bell Inequalities [0407199v2] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
|
| related topics |
| {key, protocol, security} |
| {state, states, entangled} |
| {phase, path, phys} |
| {group, space, representation} |
| {particle, mechanics, theory} |
| {state, states, coherent} |
| {energy, gaussian, time} |
| {bell, inequality, local} |
| {information, entropy, channel} |
| {cos, sin, state} |
| {alice, bob, state} |
| {states, state, optimal} |
| {error, code, errors} |
| {state, phys, rev} |
| {let, theorem, proof} |
| {photon, photons, single} |
| {measurement, state, measurements} |
| {spin, pulse, spins} |
| {entanglement, phys, rev} |
| {equation, function, exp} |
|