related words |
assche |
sealing |
nordholt |
breeding |
achievability |
tamaki |
attacker |
vernam |
sifting |
decrypt |
untagged |
password |
unassisted |
cheaters |
cheats |
authenticate |
bessette |
adversarys |
decryption |
cryptosystem |
|
related documents |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Cotangent bundle quantization: Entangling of metric and magnetic field [0505144v2] |
Semiclassical propagator of the Wigner function [0508057v2] |
|
related topics |
{key, protocol, security} |
{phase, path, phys} |
{group, space, representation} |
{alice, bob, state} |
{states, state, optimal} |
{equation, function, exp} |
{time, wave, function} |
{let, theorem, proof} |
{field, particle, equation} |
{cos, sin, state} |
{classical, space, random} |
{observables, space, algebra} |
{level, atom, field} |
{energy, state, states} |
{algorithm, log, probability} |
{state, states, entangled} |
{bell, inequality, local} |
{operator, operators, space} |
{light, field, probe} |
{time, decoherence, evolution} |
|