related words |
sealing |
attacker |
breeding |
achievability |
vernam |
tamaki |
untagged |
sifting |
decrypt |
decryption |
adversarys |
cryptosystem |
unassisted |
bessette |
cheaters |
authenticate |
password |
insecurity |
cheats |
chords |
|
related documents |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
Single photon generation by pulsed excitation of a single dipole [0007037v1] |
Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
|
related topics |
{key, protocol, security} |
{photon, photons, single} |
{alice, bob, state} |
{state, states, entangled} |
{state, phys, rev} |
{spin, pulse, spins} |
{level, atom, field} |
{states, state, optimal} |
{bell, inequality, local} |
{time, wave, function} |
{information, entropy, channel} |
{light, field, probe} |
{algorithm, log, probability} |
{particle, mechanics, theory} |
{entanglement, phys, rev} |
{error, code, errors} |
{cos, sin, state} |
{time, systems, information} |
{energy, gaussian, time} |
{classical, space, random} |
|