| related words |
| authentication |
| cryptology |
| unconditionally |
| plaintext |
| cheating |
| cipher |
| crypto |
| hashing |
| encrypt |
| eavesdroppers |
| ballot |
| encrypted |
| secrecy |
| mayers |
| trusted |
| ciphers |
| preprocessing |
| ciphertext |
| sifted |
| establishment |
|
| related documents |
| Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
| Quantum cryptography with continuous alphabet [0304035v1] |
| Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
| Quantum Digital Signatures [0105032v2] |
| Improving the security of secure direct communication based on secret
transmitting order of particles [0612016v1] |
| Private Quantum Channels and the Cost of Randomizing Quantum Information [0003101v2] |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| Symmetry implies independence [0703069v1] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
| Practical Scheme To Share A Secret Key Through An Up To 27.6% Bit Error
Rate Quantum Channel [0205060v3] |
| Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
| Reply to Comment on ''Quantum key distribution for d-level systems with
generalized Bell states'' [0509189v2] |
| Eavesdropping on the "ping-pong" type quantum communication protocols
with invisible photon [0508002v2] |
| BDSW protocol revisited: an efficient method for the key distillation
without classical computational complexity [0409099v2] |
| Unconditionally Secure Quantum Coin Tossing via Entanglement Swapping [0012139v2] |
| A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
| Unifying classical and quantum key distillation [0608199v3] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {algorithm, log, probability} |
| {photon, photons, single} |
| {theory, mechanics, state} |
| {let, theorem, proof} |
| {time, systems, information} |
| {state, states, entangled} |
| {error, code, errors} |
| {state, phys, rev} |
| {information, entropy, channel} |
| {states, state, optimal} |
| {observables, space, algebra} |
| {particle, mechanics, theory} |
| {qubit, qubits, gate} |
| {state, algorithm, problem} |
| {vol, operators, histories} |
| {bell, inequality, local} |
| {cos, sin, state} |
| {measurement, state, measurements} |
|