related words |
cryptosystem |
insecurity |
decryption |
untagged |
sigact |
decrypt |
vernam |
encrypting |
attacker |
sifting |
concealing |
adversarys |
nordholt |
bessette |
tagged |
composability |
sealing |
nonrandom |
cryptosystems |
tamaki |
|
related documents |
Quantum protocols for anonymous voting and surveying [0504161v2] |
Deutsch-Jozsa Algorithm Revisited in the Domain of Cryptographically
Significant Boolean Functions [0410042v1] |
On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
Unifying classical and quantum key distillation [0608199v3] |
Secure key from bound entanglement [0309110v2] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
Quantum Digital Signatures [0105032v2] |
Experimental Quantum Key Distribution with Decoy States [0503192v4] |
Security of classical noise-based cryptography [0002044v2] |
Method for decoupling error correction from privacy amplification [0201030v1] |
Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
Limits on Efficient Computation in the Physical World [0412143v2] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
|
related topics |
{key, protocol, security} |
{algorithm, log, probability} |
{alice, bob, state} |
{state, states, entangled} |
{let, theorem, proof} |
{photon, photons, single} |
{theory, mechanics, state} |
{state, algorithm, problem} |
{state, phys, rev} |
{information, entropy, channel} |
{error, code, errors} |
{phase, path, phys} |
{bell, inequality, local} |
{states, state, optimal} |
{wave, scattering, interference} |
{light, field, probe} |
{time, systems, information} |
{entanglement, phys, rev} |
{particle, mechanics, theory} |
{classical, space, random} |
|