nordholt

related words
sealing
attacker
breeding
achievability
vernam
tamaki
untagged
sifting
decrypt
decryption
adversarys
cryptosystem
unassisted
bessette
cheaters
authenticate
password
insecurity
cheats
chords
related documents
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states [0609094v1]
Enhancing practical security of quantum key distribution with a few decoy states [0503002v1]
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1]
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2]
Eavesdropper's Optimal Information in Variations of Bennett-Brassard 1984 Quantum Key Distribution in the Coherent Attacks [0009006v5]
Quantum Key Distribution with High Loss: Toward Global Secure Communication [0211153v5]
Security of Quantum Key Distribution with Entangled Photons Against Individual Attacks [0012078v1]
Single photon generation by pulsed excitation of a single dipole [0007037v1]
Detecting two-party quantum correlations in quantum key distribution protocols [0409047v1]
related topics
{key, protocol, security}
{photon, photons, single}
{alice, bob, state}
{state, states, entangled}
{state, phys, rev}
{spin, pulse, spins}
{level, atom, field}
{states, state, optimal}
{bell, inequality, local}
{time, wave, function}
{information, entropy, channel}
{light, field, probe}
{algorithm, log, probability}
{particle, mechanics, theory}
{entanglement, phys, rev}
{error, code, errors}
{cos, sin, state}
{time, systems, information}
{energy, gaussian, time}
{classical, space, random}