related words |
committing |
vernam |
eurocrypt |
untagged |
attacker |
decrypt |
decryption |
nordholt |
cryptosystem |
sifting |
sealing |
insecurity |
composable |
adversarys |
tamaki |
bessette |
breeding |
achievability |
encrypting |
mother |
|
related documents |
Universally composable privacy amplification against quantum adversaries [0403133v2] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Quantum information processing, operational quantum logic, convexity,
and the foundations of physics [0304159v1] |
Compatibility of representations of quantum systems [0612096v1] |
Coordinating quantum agents' perspectives: convex operational theories,
quantum information, and quantum foundations [0611110v1] |
Limits on Efficient Computation in the Physical World [0412143v2] |
|
related topics |
{key, protocol, security} |
{observables, space, algebra} |
{algorithm, log, probability} |
{operator, operators, space} |
{group, space, representation} |
{let, theorem, proof} |
{theory, mechanics, state} |
{information, entropy, channel} |
{time, systems, information} |
{field, particle, equation} |
{state, algorithm, problem} |
{alice, bob, state} |
{particle, mechanics, theory} |
{force, casimir, field} |
{energy, gaussian, time} |
{vol, operators, histories} |
{qubit, qubits, gate} |
{spin, pulse, spins} |
{error, code, errors} |
{energy, state, states} |
|