| related words |
| nordholt |
| sealing |
| breeding |
| achievability |
| attacker |
| tamaki |
| malicious |
| vernam |
| sifting |
| cheaters |
| password |
| authenticate |
| bessette |
| untagged |
| decrypt |
| unassisted |
| adversarys |
| decryption |
| cheats |
| compromised |
|
| related documents |
| Experimentally realizable quantum comparison of coherent states and its
applications [0601130v2] |
| Quantum walks based on an interferometric analogy [0302161v1] |
| Quantum non-locality in two three-level systems [0111143v2] |
| Selective truncations of an optical state using projection synthesis [0605146v1] |
| A concise guide to complex Hadamard matrices [0512154v2] |
|
| related topics |
| {key, protocol, security} |
| {classical, space, random} |
| {photon, photons, single} |
| {bell, inequality, local} |
| {let, theorem, proof} |
| {state, states, entangled} |
| {state, phys, rev} |
| {algorithm, log, probability} |
| {states, state, optimal} |
| {state, states, coherent} |
| {alice, bob, state} |
| {entanglement, phys, rev} |
| {information, entropy, channel} |
| {cos, sin, state} |
| {state, algorithm, problem} |
| {equation, function, exp} |
| {wave, scattering, interference} |
| {phase, path, phys} |
| {group, space, representation} |
| {energy, gaussian, time} |
|