| related words |
| privacy |
| public |
| commitment |
| cryptographic |
| encryption |
| cheating |
| eavesdropper |
| attack |
| unconditionally |
| mayers |
| insecure |
| plaintext |
| secure |
| cryptology |
| authentication |
| private |
| honest |
| cipher |
| unconditional |
| crypto |
|
| related documents |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
| Security of Quantum Key Distribution Against All Collective Attacks [9801022v1] |
| Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
| Security of quantum key distribution using d-level systems [0107130v1] |
| Quantum Gambling Using Two Nonorthogonal States [0010103v5] |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| Two-Way Quantum Number Distribution Based on Entanglement and Bell-State
Measurements [0407138v1] |
| A fundamental threat to quantum cryptography: gravitational attacks [0603234v1] |
| Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
| Symmetry implies independence [0703069v1] |
| Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
| Quantum cryptography with continuous alphabet [0304035v1] |
| Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
| Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {wave, scattering, interference} |
| {photon, photons, single} |
| {temperature, thermal, energy} |
| {particle, mechanics, theory} |
| {state, phys, rev} |
| {spin, pulse, spins} |
| {theory, mechanics, state} |
| {bell, inequality, local} |
| {vol, operators, histories} |
| {state, states, entangled} |
| {time, wave, function} |
| {cos, sin, state} |
| {states, state, optimal} |
| {algorithm, log, probability} |
| {error, code, errors} |
| {let, theorem, proof} |
| {level, atom, field} |
| {information, entropy, channel} |
|