| related words |
| chords |
| compromised |
| assche |
| polytechnique |
| achievability |
| management |
| sealing |
| authenticate |
| nordholt |
| exponentiated |
| tamaki |
| adversarys |
| malicious |
| attacker |
| appending |
| unassisted |
| multiports |
| sifting |
| dominic |
| cheats |
|
| related documents |
| Quantum key distribution network with wavelength addressing [0610096v2] |
| Ultrafast Pulse Shaping Approaches to Quantum Computing [0312192v1] |
| Isoholonomic Problem and Holonomic Quantum Computation [0505033v1] |
| Theory of hybrid systems. I. The operator formulation of classical
mechanics and semiclassical limit [0103044v1] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| A novel experimental approach for the detection of the dynamic Casimir
effect [0411085v1] |
| Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
| An Introduction to Error-Correcting Codes: From Classical to Quantum [0602157v1] |
| Slow light in three-level cold atoms: a numerical analysis [0102045v1] |
| Quantum-classical correspondence on compact phase space [0601139v1] |
|
| related topics |
| {key, protocol, security} |
| {phase, path, phys} |
| {spin, pulse, spins} |
| {light, field, probe} |
| {classical, space, random} |
| {error, code, errors} |
| {group, space, representation} |
| {operator, operators, space} |
| {photon, photons, single} |
| {cavity, atom, atoms} |
| {force, casimir, field} |
| {level, atom, field} |
| {qubit, qubits, gate} |
| {trap, ion, state} |
| {field, particle, equation} |
| {state, algorithm, problem} |
| {vol, operators, histories} |
| {temperature, thermal, energy} |
| {alice, bob, state} |
| {state, phys, rev} |
|