| related words |
| intercepted |
| denied |
| breeding |
| achievability |
| sealing |
| commits |
| nordholt |
| commitments |
| cheaters |
| password |
| tamaki |
| mother |
| sacrifice |
| election |
| authenticate |
| malicious |
| attacker |
| compromised |
| cheater |
| management |
|
| related documents |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Sensible Quantum Mechanics: Are Only Perceptions Probabilistic? [9506010v2] |
| On the upper bound of the electronic kinetic energy in terms of density
functionals [0504055v1] |
| Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
| Universally composable privacy amplification against quantum adversaries [0403133v2] |
| Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
| Quantum X-waves in Kerr media and the progressive undistorted squeezed
vacuum [0409130v1] |
| Phase-Control of Photoabsorption in Optically Dense Media [0007004v1] |
| Quantum Trajectories for Realistic Detection [0112129v1] |
|
| related topics |
| {key, protocol, security} |
| {light, field, probe} |
| {temperature, thermal, energy} |
| {theory, mechanics, state} |
| {photon, photons, single} |
| {level, atom, field} |
| {energy, gaussian, time} |
| {state, states, coherent} |
| {wave, scattering, interference} |
| {vol, operators, histories} |
| {measurement, state, measurements} |
| {field, particle, equation} |
| {phase, path, phys} |
| {information, entropy, channel} |
| {state, phys, rev} |
| {energy, state, states} |
| {equation, function, exp} |
| {algorithm, log, probability} |
| {operator, operators, space} |
| {time, wave, function} |
|