malicious

related words
tamaki
cheats
preskills
authenticate
randomize
breeding
achievability
sealing
partys
nordholt
secrets
password
bessette
cheaters
intercepted
attacker
buttler
shamir
fingerprinting
cheater
related documents
On quantum and approximate privacy [0110038v3]
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances [9803006v5]
Quantum protocols for anonymous voting and surveying [0504161v2]
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1]
Quantum Search in an Ordered List via Adaptive Learning [0703231v2]
An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen Pairs [0504120v2]
Quantum Theory of Observers [0108079v1]
Secure Communication Using Qubits [0503157v1]
Secure Coherent-state Quantum Key Distribution Protocols with Efficient Reconciliation [0410031v1]
related topics
{key, protocol, security}
{alice, bob, state}
{algorithm, log, probability}
{classical, space, random}
{theory, mechanics, state}
{time, decoherence, evolution}
{measurement, state, measurements}
{particle, mechanics, theory}
{energy, gaussian, time}
{observables, space, algebra}
{temperature, thermal, energy}
{error, code, errors}
{cos, sin, state}
{information, entropy, channel}
{states, state, optimal}
{state, algorithm, problem}
{time, systems, information}
{state, states, entangled}
{state, phys, rev}
{state, states, coherent}