attacking

related words
randomize
breeding
achievability
sealing
nordholt
authenticate
intercepted
tamaki
cheaters
password
attacker
verifiers
cheater
unassisted
sifting
vernam
malicious
untagged
decrypt
cheats
related documents
Quantum authentication protocol [0001046v1]
Systematic Analysis of Majorization in Quantum Algorithms [0212094v2]
Finding Solutions to NP Problems: Philosophical Difference Between Quantum and Evolutionary Search Algorithms [0010021v1]
Quantum Philosophy: The Flight from Reason in Science [9601007v1]
A de Finetti representation for finite symmetric quantum states [0410229v1]
Quantum Key Distribution with High Loss: Toward Global Secure Communication [0211153v5]
Coherent eavesdropping strategies for the 4-state quantum cryptography protocol [9702002v1]
How Stands Collapse I [0611211v1]
Expanded Conclusive Eavesdropping in Quantum Key Distribution [0509211v1]
Book Review: 'A New Kind of Science' [0206089v2]
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1]
On the security of AlphaEta: Response to `Some attacks on quantum-based cryptographic protocols' [0509091v3]
related topics
{key, protocol, security}
{state, algorithm, problem}
{particle, mechanics, theory}
{algorithm, log, probability}
{theory, mechanics, state}
{alice, bob, state}
{measurement, state, measurements}
{let, theorem, proof}
{time, systems, information}
{bell, inequality, local}
{states, state, optimal}
{information, entropy, channel}
{photon, photons, single}
{energy, gaussian, time}
{state, phys, rev}
{qubit, qubits, gate}
{light, field, probe}
{state, states, entangled}
{time, wave, function}
{time, decoherence, evolution}