related words |
tamaki |
cheats |
preskills |
authenticate |
randomize |
breeding |
achievability |
sealing |
partys |
nordholt |
secrets |
password |
bessette |
cheaters |
intercepted |
attacker |
buttler |
shamir |
fingerprinting |
cheater |
|
related documents |
On quantum and approximate privacy [0110038v3] |
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
Quantum protocols for anonymous voting and surveying [0504161v2] |
A fundamental threat to quantum cryptography: gravitational attacks [0603234v1] |
Quantum Search in an Ordered List via Adaptive Learning [0703231v2] |
An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen
Pairs [0504120v2] |
Quantum Theory of Observers [0108079v1] |
Secure Communication Using Qubits [0503157v1] |
Secure Coherent-state Quantum Key Distribution Protocols with Efficient
Reconciliation [0410031v1] |
|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{algorithm, log, probability} |
{classical, space, random} |
{theory, mechanics, state} |
{time, decoherence, evolution} |
{measurement, state, measurements} |
{particle, mechanics, theory} |
{energy, gaussian, time} |
{observables, space, algebra} |
{temperature, thermal, energy} |
{error, code, errors} |
{cos, sin, state} |
{information, entropy, channel} |
{states, state, optimal} |
{state, algorithm, problem} |
{time, systems, information} |
{state, states, entangled} |
{state, phys, rev} |
{state, states, coherent} |
|