related words |
randomize |
breeding |
achievability |
sealing |
nordholt |
authenticate |
intercepted |
tamaki |
cheaters |
password |
attacker |
verifiers |
cheater |
unassisted |
sifting |
vernam |
malicious |
untagged |
decrypt |
cheats |
|
related documents |
Quantum authentication protocol [0001046v1] |
Systematic Analysis of Majorization in Quantum Algorithms [0212094v2] |
Finding Solutions to NP Problems: Philosophical Difference Between
Quantum and Evolutionary Search Algorithms [0010021v1] |
Quantum Philosophy: The Flight from Reason in Science [9601007v1] |
A de Finetti representation for finite symmetric quantum states [0410229v1] |
Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
How Stands Collapse I [0611211v1] |
Expanded Conclusive Eavesdropping in Quantum Key Distribution [0509211v1] |
Book Review: 'A New Kind of Science' [0206089v2] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
|
related topics |
{key, protocol, security} |
{state, algorithm, problem} |
{particle, mechanics, theory} |
{algorithm, log, probability} |
{theory, mechanics, state} |
{alice, bob, state} |
{measurement, state, measurements} |
{let, theorem, proof} |
{time, systems, information} |
{bell, inequality, local} |
{states, state, optimal} |
{information, entropy, channel} |
{photon, photons, single} |
{energy, gaussian, time} |
{state, phys, rev} |
{qubit, qubits, gate} |
{light, field, probe} |
{state, states, entangled} |
{time, wave, function} |
{time, decoherence, evolution} |
|