| related words |
| commits |
| malicious |
| nordholt |
| sealing |
| attacker |
| mother |
| breeding |
| achievability |
| authenticate |
| vernam |
| tamaki |
| untagged |
| sifting |
| decrypt |
| concealing |
| commitments |
| eurocrypt |
| decryption |
| adversarys |
| cryptosystem |
|
| related documents |
| Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Generalizations of Kochen and Specker's Theorem and the Effectiveness of
Gleason's Theorem [0307139v1] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Translation of Lueders' "Uber die Zustandsanderung durch den
Messprozess" [0403007v2] |
| Quantum Probability from Subjective Likelihood: improving on Deutsch's
proof of the probability rule [0312157v2] |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| Can measuring entanglement be easy? [0606017v1] |
| Limits and restrictions of private quantum channel [0506107v1] |
| Theory of quantum computation [0010057v1] |
| Limits on Efficient Computation in the Physical World [0412143v2] |
| In defence of naivete: The conceptual status of Lagrangian QFT [0112148v1] |
|
| related topics |
| {key, protocol, security} |
| {theory, mechanics, state} |
| {let, theorem, proof} |
| {algorithm, log, probability} |
| {measurement, state, measurements} |
| {observables, space, algebra} |
| {state, states, entangled} |
| {alice, bob, state} |
| {time, systems, information} |
| {energy, gaussian, time} |
| {states, state, optimal} |
| {photon, photons, single} |
| {entanglement, phys, rev} |
| {operator, operators, space} |
| {information, entropy, channel} |
| {group, space, representation} |
| {particle, mechanics, theory} |
| {error, code, errors} |
| {bell, inequality, local} |
| {field, particle, equation} |
|