compromised

related words
tamaki
adversarys
functionality
sealing
malicious
breeding
achievability
nordholt
attacker
cheats
buttler
password
intercepted
dominic
cheaters
hamada
vernam
sifting
decrypt
authenticate
related documents
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2]
Storing and processing optical information with ultra-slow light in Bose-Einstein condensates [0404018v1]
Security of Quantum Key Distribution with Entangled Photons Against Individual Attacks [0012078v1]
The effect of self-affine fractal roughness of wires on atom chips [0703123v1]
Universally composable privacy amplification against quantum adversaries [0403133v2]
Fault-tolerant quantum computation [9712048v1]
Communicating Quantum Processes [0409052v1]
Decoherence in strongly coupled quantum oscillators [0309082v1]
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1]
Improvement of quantum key distribution protocols [9810021v1]
Quantum exam [0602232v1]
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1]
Secure Communication Using Qubits [0503157v1]
Semiclassical evaluation of quantum fidelity [0302192v2]
related topics
{key, protocol, security}
{classical, space, random}
{error, code, errors}
{light, field, probe}
{state, states, coherent}
{cavity, atom, atoms}
{alice, bob, state}
{time, wave, function}
{temperature, thermal, energy}
{force, casimir, field}
{level, atom, field}
{qubit, qubits, gate}
{time, decoherence, evolution}
{state, phys, rev}
{photon, photons, single}
{trap, ion, state}
{time, systems, information}
{energy, gaussian, time}
{vol, operators, histories}
{entanglement, phys, rev}