| related words |
| untagged |
| vernam |
| decryption |
| cryptosystem |
| attacker |
| insecurity |
| sifting |
| nordholt |
| sealing |
| bessette |
| encrypting |
| adversarys |
| tamaki |
| eurocrypt |
| concealing |
| breeding |
| achievability |
| cheats |
| unassisted |
| mother |
|
| related documents |
| Experimental Quantum Secret Sharing and Third-Man Quantum Cryptography [0502131v2] |
| Anonymous-key quantum cryptography and unconditionally secure quantum
bit commitment [0009113v1] |
| From quantum-codemaking to quantum code-breaking [9703035v1] |
| Randomizing quantum states: Constructions and applications [0307104v3] |
| Limits and restrictions of private quantum channel [0506107v1] |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
| Cheat Sensitive Quantum Bit Commitment [9911043v5] |
| Experimentally realizable quantum comparison of coherent states and its
applications [0601130v2] |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
| Quantum authentication protocol [0001046v1] |
| Channel kets, entangled states, and the location of quantum information [0409106v3] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Invertible Quantum Operations and Perfect Encryption of Quantum States [0605041v4] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {vol, operators, histories} |
| {information, entropy, channel} |
| {photon, photons, single} |
| {states, state, optimal} |
| {state, states, entangled} |
| {error, code, errors} |
| {entanglement, phys, rev} |
| {algorithm, log, probability} |
| {theory, mechanics, state} |
| {observables, space, algebra} |
| {state, phys, rev} |
| {particle, mechanics, theory} |
| {let, theorem, proof} |
| {time, decoherence, evolution} |
| {wave, scattering, interference} |
| {bell, inequality, local} |
| {operator, operators, space} |
| {state, states, coherent} |
|