related words |
nordholt |
sealing |
breeding |
achievability |
attacker |
tamaki |
malicious |
vernam |
sifting |
cheaters |
password |
authenticate |
bessette |
untagged |
decrypt |
unassisted |
adversarys |
decryption |
cheats |
compromised |
|
related documents |
Experimentally realizable quantum comparison of coherent states and its
applications [0601130v2] |
Quantum walks based on an interferometric analogy [0302161v1] |
Quantum non-locality in two three-level systems [0111143v2] |
Selective truncations of an optical state using projection synthesis [0605146v1] |
A concise guide to complex Hadamard matrices [0512154v2] |
|
related topics |
{key, protocol, security} |
{classical, space, random} |
{photon, photons, single} |
{bell, inequality, local} |
{let, theorem, proof} |
{state, states, entangled} |
{state, phys, rev} |
{algorithm, log, probability} |
{states, state, optimal} |
{state, states, coherent} |
{alice, bob, state} |
{entanglement, phys, rev} |
{information, entropy, channel} |
{cos, sin, state} |
{state, algorithm, problem} |
{equation, function, exp} |
{wave, scattering, interference} |
{phase, path, phys} |
{group, space, representation} |
{energy, gaussian, time} |
|