related words |
attacker |
vernam |
untagged |
decrypt |
nordholt |
sealing |
decryption |
cryptosystem |
insecurity |
adversarys |
tamaki |
breeding |
achievability |
bessette |
encrypting |
eurocrypt |
unassisted |
concealing |
chords |
mother |
|
related documents |
Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
Improvement of quantum key distribution protocols [9810021v1] |
Security of quantum key distribution using d-level systems [0107130v1] |
Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
Quantum cloning with continuous variables [0210061v1] |
Implications of invariance of the Hamiltonian under canonical
transformations in phase space [9905002v1] |
|
related topics |
{key, protocol, security} |
{equation, function, exp} |
{group, space, representation} |
{phase, path, phys} |
{alice, bob, state} |
{energy, gaussian, time} |
{field, particle, equation} |
{photon, photons, single} |
{state, states, coherent} |
{states, state, optimal} |
{cos, sin, state} |
{vol, operators, histories} |
{information, entropy, channel} |
{entanglement, phys, rev} |
{state, states, entangled} |
{theory, mechanics, state} |
{cavity, atom, atoms} |
{wave, scattering, interference} |
{light, field, probe} |
{qubit, qubits, gate} |
|