| related words |
| attacker |
| vernam |
| untagged |
| decrypt |
| nordholt |
| sealing |
| decryption |
| cryptosystem |
| insecurity |
| adversarys |
| tamaki |
| breeding |
| achievability |
| bessette |
| encrypting |
| eurocrypt |
| unassisted |
| concealing |
| chords |
| mother |
|
| related documents |
| Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
| Improvement of quantum key distribution protocols [9810021v1] |
| Security of quantum key distribution using d-level systems [0107130v1] |
| Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
| Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
| Quantum cloning with continuous variables [0210061v1] |
| Implications of invariance of the Hamiltonian under canonical
transformations in phase space [9905002v1] |
|
| related topics |
| {key, protocol, security} |
| {equation, function, exp} |
| {group, space, representation} |
| {phase, path, phys} |
| {alice, bob, state} |
| {energy, gaussian, time} |
| {field, particle, equation} |
| {photon, photons, single} |
| {state, states, coherent} |
| {states, state, optimal} |
| {cos, sin, state} |
| {vol, operators, histories} |
| {information, entropy, channel} |
| {entanglement, phys, rev} |
| {state, states, entangled} |
| {theory, mechanics, state} |
| {cavity, atom, atoms} |
| {wave, scattering, interference} |
| {light, field, probe} |
| {qubit, qubits, gate} |
|