related words |
password |
preskills |
qunits |
cheats |
cheater |
cheaters |
tamaki |
coalition |
honestly |
intercepted |
authenticate |
buttler |
breeding |
achievability |
secrets |
malicious |
randomize |
molotkov |
sealing |
aborts |
|
related documents |
Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
Entangled Quantum Clocks for Measuring Proper-Time Difference [0012003v5] |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
Quantum protocols for anonymous voting and surveying [0504161v2] |
|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{state, phys, rev} |
{phase, path, phys} |
{time, wave, function} |
{particle, mechanics, theory} |
{cos, sin, state} |
{states, state, optimal} |
{information, entropy, channel} |
{error, code, errors} |
{vol, operators, histories} |
{group, space, representation} |
{entanglement, phys, rev} |
{time, systems, information} |
{algorithm, log, probability} |
{theory, mechanics, state} |
{let, theorem, proof} |
{equation, function, exp} |
{observables, space, algebra} |
{state, states, entangled} |
|