related words |
privacy |
public |
commitment |
cryptographic |
encryption |
cheating |
eavesdropper |
attack |
unconditionally |
mayers |
insecure |
plaintext |
secure |
cryptology |
authentication |
private |
honest |
cipher |
unconditional |
crypto |
|
related documents |
On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
Security of Quantum Key Distribution Against All Collective Attacks [9801022v1] |
Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
Security of quantum key distribution using d-level systems [0107130v1] |
Quantum Gambling Using Two Nonorthogonal States [0010103v5] |
Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
Two-Way Quantum Number Distribution Based on Entanglement and Bell-State
Measurements [0407138v1] |
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1] |
Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
Symmetry implies independence [0703069v1] |
Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
Quantum protocols for anonymous voting and surveying [0504161v2] |
Quantum cryptography with continuous alphabet [0304035v1] |
Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{wave, scattering, interference} |
{photon, photons, single} |
{temperature, thermal, energy} |
{particle, mechanics, theory} |
{state, phys, rev} |
{spin, pulse, spins} |
{theory, mechanics, state} |
{bell, inequality, local} |
{vol, operators, histories} |
{state, states, entangled} |
{time, wave, function} |
{cos, sin, state} |
{states, state, optimal} |
{algorithm, log, probability} |
{error, code, errors} |
{let, theorem, proof} |
{level, atom, field} |
{information, entropy, channel} |
|