related words |
commits |
malicious |
nordholt |
sealing |
attacker |
mother |
breeding |
achievability |
authenticate |
vernam |
tamaki |
untagged |
sifting |
decrypt |
concealing |
commitments |
eurocrypt |
decryption |
adversarys |
cryptosystem |
|
related documents |
Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
Generalizations of Kochen and Specker's Theorem and the Effectiveness of
Gleason's Theorem [0307139v1] |
Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
Translation of Lueders' "Uber die Zustandsanderung durch den
Messprozess" [0403007v2] |
Quantum Probability from Subjective Likelihood: improving on Deutsch's
proof of the probability rule [0312157v2] |
Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
Can measuring entanglement be easy? [0606017v1] |
Limits and restrictions of private quantum channel [0506107v1] |
Theory of quantum computation [0010057v1] |
Limits on Efficient Computation in the Physical World [0412143v2] |
In defence of naivete: The conceptual status of Lagrangian QFT [0112148v1] |
|
related topics |
{key, protocol, security} |
{theory, mechanics, state} |
{let, theorem, proof} |
{algorithm, log, probability} |
{measurement, state, measurements} |
{observables, space, algebra} |
{state, states, entangled} |
{alice, bob, state} |
{time, systems, information} |
{energy, gaussian, time} |
{states, state, optimal} |
{photon, photons, single} |
{entanglement, phys, rev} |
{operator, operators, space} |
{information, entropy, channel} |
{group, space, representation} |
{particle, mechanics, theory} |
{error, code, errors} |
{bell, inequality, local} |
{field, particle, equation} |
|