related words |
tamaki |
adversarys |
functionality |
sealing |
malicious |
breeding |
achievability |
nordholt |
attacker |
cheats |
buttler |
password |
intercepted |
dominic |
cheaters |
hamada |
vernam |
sifting |
decrypt |
authenticate |
|
related documents |
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
Storing and processing optical information with ultra-slow light in
Bose-Einstein condensates [0404018v1] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
The effect of self-affine fractal roughness of wires on atom chips [0703123v1] |
Universally composable privacy amplification against quantum adversaries [0403133v2] |
Fault-tolerant quantum computation [9712048v1] |
Communicating Quantum Processes [0409052v1] |
Decoherence in strongly coupled quantum oscillators [0309082v1] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Improvement of quantum key distribution protocols [9810021v1] |
Quantum exam [0602232v1] |
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1] |
Secure Communication Using Qubits [0503157v1] |
Semiclassical evaluation of quantum fidelity [0302192v2] |
|
related topics |
{key, protocol, security} |
{classical, space, random} |
{error, code, errors} |
{light, field, probe} |
{state, states, coherent} |
{cavity, atom, atoms} |
{alice, bob, state} |
{time, wave, function} |
{temperature, thermal, energy} |
{force, casimir, field} |
{level, atom, field} |
{qubit, qubits, gate} |
{time, decoherence, evolution} |
{state, phys, rev} |
{photon, photons, single} |
{trap, ion, state} |
{time, systems, information} |
{energy, gaussian, time} |
{vol, operators, histories} |
{entanglement, phys, rev} |
|