related words |
intercepted |
denied |
breeding |
achievability |
sealing |
commits |
nordholt |
commitments |
cheaters |
password |
tamaki |
mother |
sacrifice |
election |
authenticate |
malicious |
attacker |
compromised |
cheater |
management |
|
related documents |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Sensible Quantum Mechanics: Are Only Perceptions Probabilistic? [9506010v2] |
On the upper bound of the electronic kinetic energy in terms of density
functionals [0504055v1] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
Universally composable privacy amplification against quantum adversaries [0403133v2] |
Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
Quantum X-waves in Kerr media and the progressive undistorted squeezed
vacuum [0409130v1] |
Phase-Control of Photoabsorption in Optically Dense Media [0007004v1] |
Quantum Trajectories for Realistic Detection [0112129v1] |
|
related topics |
{key, protocol, security} |
{light, field, probe} |
{temperature, thermal, energy} |
{theory, mechanics, state} |
{photon, photons, single} |
{level, atom, field} |
{energy, gaussian, time} |
{state, states, coherent} |
{wave, scattering, interference} |
{vol, operators, histories} |
{measurement, state, measurements} |
{field, particle, equation} |
{phase, path, phys} |
{information, entropy, channel} |
{state, phys, rev} |
{energy, state, states} |
{equation, function, exp} |
{algorithm, log, probability} |
{operator, operators, space} |
{time, wave, function} |
|