related words |
cryptosystem |
insecurity |
untagged |
decrypt |
vernam |
encrypting |
attacker |
sifting |
nordholt |
adversarys |
concealing |
bessette |
eurocrypt |
sealing |
tamaki |
nonrandom |
breeding |
achievability |
cryptosystems |
mother |
|
related documents |
Limits and restrictions of private quantum channel [0506107v1] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
From quantum-codemaking to quantum code-breaking [9703035v1] |
How much security does Y-00 protocol provide us ? [0310168v2] |
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
Anonymous-key quantum cryptography and unconditionally secure quantum
bit commitment [0009113v1] |
A Modified Wigner's Inequality for Secure Quantum Key Distribution [0302196v1] |
Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution [0302033v2] |
Experimental Quantum Cryptography with Qutrits [0511163v2] |
On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
Quantum and Classical Noise in Practical Quantum Cryptography Systems
based on polarization-entangled photons [0205142v2] |
Invertible Quantum Operations and Perfect Encryption of Quantum States [0605041v4] |
|
related topics |
{key, protocol, security} |
{states, state, optimal} |
{bell, inequality, local} |
{information, entropy, channel} |
{photon, photons, single} |
{alice, bob, state} |
{cos, sin, state} |
{algorithm, log, probability} |
{state, phys, rev} |
{wave, scattering, interference} |
{error, code, errors} |
{particle, mechanics, theory} |
{theory, mechanics, state} |
{entanglement, phys, rev} |
{state, states, entangled} |
{qubit, qubits, gate} |
{operator, operators, space} |
{light, field, probe} |
{group, space, representation} |
{let, theorem, proof} |
|