| related words |
| secure |
| security |
| attack |
| secret |
| eavesdropping |
| message |
| protocols |
| bobs |
| public |
| attacks |
| sends |
| cryptography |
| eavesdropper |
| cryptographic |
| privacy |
| brassard |
| receiver |
| parties |
| commitment |
| alices |
|
| related documents |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1] |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
| Secure Communication Using Qubits [0503157v1] |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
| Deterministic Secure Direct Communication Using Ping-pong protocol
without public channel [0301048v1] |
| Quantum cryptography with continuous alphabet [0304035v1] |
| Unifying classical and quantum key distillation [0608199v3] |
| Security of classical noise-based cryptography [0002044v2] |
| Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
| Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| Quantum cryptography with a predetermined key, using continuous variable
Einstein-Podolsky-Rosen correlations [9909030v2] |
| Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
| Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
| Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed
States [0611145v1] |
| Two qubit copying machine for economical quantum eavesdropping [9810008v2] |
| Improving the security of secure direct communication based on secret
transmitting order of particles [0612016v1] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {algorithm, log, probability} |
| {vol, operators, histories} |
| {photon, photons, single} |
| {let, theorem, proof} |
| {information, entropy, channel} |
| {states, state, optimal} |
| {qubit, qubits, gate} |
| {state, phys, rev} |
| {state, states, coherent} |
| {measurement, state, measurements} |
| {cos, sin, state} |
| {group, space, representation} |
| {state, states, entangled} |
| {bell, inequality, local} |
| {phase, path, phys} |
| {error, code, errors} |
| {light, field, probe} |
| {entanglement, phys, rev} |
|