| related words |
| bessette |
| authentic |
| cheats |
| tamaki |
| decrypt |
| vernam |
| untagged |
| buttler |
| attacker |
| decryption |
| trojan |
| insecurity |
| caught |
| nordholt |
| sifting |
| sealing |
| encrypting |
| multiports |
| cryptosystems |
| malicious |
|
| related documents |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| Optimization of security costs in nested purification protocol [0202171v1] |
| Experimental investigation of quantum key distribution with position and
momentum of photon pairs [0411183v2] |
| Accuracy of quantum-state estimation utilizing Akaike's information
criterion [0306083v1] |
| A Modified Wigner's Inequality for Secure Quantum Key Distribution [0302196v1] |
| A novel quantum key distribution scheme with orthogonal product states [0102060v1] |
| Deterministic secure communication protocol without using entanglement [0304141v3] |
| Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Quantum and Classical Noise in Practical Quantum Cryptography Systems
based on polarization-entangled photons [0205142v2] |
| Transport of Quantum States and Separation of Ions in a Dual RF Ion Trap [0205094v1] |
| Quantum cryptographic ranging [0112079v1] |
| Quantum Key Distribution with vacuum--one-photon entangled states [0504150v2] |
| Optimal focusing for maximal collection of entangled narrow-band photon
pairs into single-mode fibers [0507046v2] |
| New Developments in the Casimir Effect [0106045v1] |
| Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
|
| related topics |
| {key, protocol, security} |
| {photon, photons, single} |
| {trap, ion, state} |
| {alice, bob, state} |
| {time, systems, information} |
| {force, casimir, field} |
| {state, phys, rev} |
| {light, field, probe} |
| {cos, sin, state} |
| {equation, function, exp} |
| {state, states, entangled} |
| {temperature, thermal, energy} |
| {information, entropy, channel} |
| {entanglement, phys, rev} |
| {level, atom, field} |
| {field, particle, equation} |
| {operator, operators, space} |
| {energy, gaussian, time} |
| {bell, inequality, local} |
| {states, state, optimal} |
|