related words |
chords |
compromised |
assche |
polytechnique |
achievability |
management |
sealing |
authenticate |
nordholt |
exponentiated |
tamaki |
adversarys |
malicious |
attacker |
appending |
unassisted |
multiports |
sifting |
dominic |
cheats |
|
related documents |
Quantum key distribution network with wavelength addressing [0610096v2] |
Ultrafast Pulse Shaping Approaches to Quantum Computing [0312192v1] |
Isoholonomic Problem and Holonomic Quantum Computation [0505033v1] |
Theory of hybrid systems. I. The operator formulation of classical
mechanics and semiclassical limit [0103044v1] |
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
A novel experimental approach for the detection of the dynamic Casimir
effect [0411085v1] |
Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
An Introduction to Error-Correcting Codes: From Classical to Quantum [0602157v1] |
Slow light in three-level cold atoms: a numerical analysis [0102045v1] |
Quantum-classical correspondence on compact phase space [0601139v1] |
|
related topics |
{key, protocol, security} |
{phase, path, phys} |
{spin, pulse, spins} |
{light, field, probe} |
{classical, space, random} |
{error, code, errors} |
{group, space, representation} |
{operator, operators, space} |
{photon, photons, single} |
{cavity, atom, atoms} |
{force, casimir, field} |
{level, atom, field} |
{qubit, qubits, gate} |
{trap, ion, state} |
{field, particle, equation} |
{state, algorithm, problem} |
{vol, operators, histories} |
{temperature, thermal, energy} |
{alice, bob, state} |
{state, phys, rev} |
|