related words |
insecurity |
cryptosystem |
decryption |
encrypting |
untagged |
decrypt |
vernam |
attacker |
sifting |
eurocrypt |
mother |
adversarys |
bessette |
nordholt |
nonrandom |
commitments |
cryptosystems |
sealing |
renner |
recipient |
|
related documents |
An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
On the interpretation of quantum theory - from Copenhagen to the present
day [0210152v1] |
The Bell-Kochen-Specker Theorem [0308114v1] |
Quantum protocols for anonymous voting and surveying [0504161v2] |
|
related topics |
{key, protocol, security} |
{theory, mechanics, state} |
{particle, mechanics, theory} |
{alice, bob, state} |
{measurement, state, measurements} |
{let, theorem, proof} |
{states, state, optimal} |
{time, decoherence, evolution} |
{observables, space, algebra} |
{information, entropy, channel} |
{energy, gaussian, time} |
{field, particle, equation} |
{algorithm, log, probability} |
{temperature, thermal, energy} |
{vol, operators, histories} |
{bell, inequality, local} |
{phase, path, phys} |
{group, space, representation} |
{force, casimir, field} |
{cavity, atom, atoms} |
|