related words |
bessette |
authentic |
cheats |
tamaki |
decrypt |
vernam |
untagged |
buttler |
attacker |
decryption |
trojan |
insecurity |
caught |
nordholt |
sifting |
sealing |
encrypting |
multiports |
cryptosystems |
malicious |
|
related documents |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
Optimization of security costs in nested purification protocol [0202171v1] |
Experimental investigation of quantum key distribution with position and
momentum of photon pairs [0411183v2] |
Accuracy of quantum-state estimation utilizing Akaike's information
criterion [0306083v1] |
A Modified Wigner's Inequality for Secure Quantum Key Distribution [0302196v1] |
A novel quantum key distribution scheme with orthogonal product states [0102060v1] |
Deterministic secure communication protocol without using entanglement [0304141v3] |
Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
Quantum and Classical Noise in Practical Quantum Cryptography Systems
based on polarization-entangled photons [0205142v2] |
Transport of Quantum States and Separation of Ions in a Dual RF Ion Trap [0205094v1] |
Quantum cryptographic ranging [0112079v1] |
Quantum Key Distribution with vacuum--one-photon entangled states [0504150v2] |
Optimal focusing for maximal collection of entangled narrow-band photon
pairs into single-mode fibers [0507046v2] |
New Developments in the Casimir Effect [0106045v1] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
|
related topics |
{key, protocol, security} |
{photon, photons, single} |
{trap, ion, state} |
{alice, bob, state} |
{time, systems, information} |
{force, casimir, field} |
{state, phys, rev} |
{light, field, probe} |
{cos, sin, state} |
{equation, function, exp} |
{state, states, entangled} |
{temperature, thermal, energy} |
{information, entropy, channel} |
{entanglement, phys, rev} |
{level, atom, field} |
{field, particle, equation} |
{operator, operators, space} |
{energy, gaussian, time} |
{bell, inequality, local} |
{states, state, optimal} |
|