tamaki

related words
cheats
sealing
nordholt
breeding
achievability
attacker
bessette
decrypt
vernam
sifting
password
malicious
untagged
cheaters
authenticate
partys
intercepted
unassisted
adversarys
cheater
related documents
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states [0609094v1]
Generalized decoding, effective channels, and simplified security proofs in quantum key distribution [0505061v3]
Experimental Quantum Key Distribution with Decoy States [0503192v4]
Detecting two-party quantum correlations in quantum key distribution protocols [0409047v1]
Multi-particle and High-dimension Controlled Order Rearrangement Encryption Protocols [0701091v1]
Secure key from bound entanglement [0309110v2]
New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1]
Lower and upper bounds on the secret key rate for QKD protocols using one--way classical communication [0410215v2]
Simple security proof of quantum key distribution via uncertainty principle [0505108v1]
related topics
{key, protocol, security}
{alice, bob, state}
{state, states, entangled}
{photon, photons, single}
{states, state, optimal}
{state, phys, rev}
{entanglement, phys, rev}
{group, space, representation}
{information, entropy, channel}
{time, systems, information}
{light, field, probe}
{qubit, qubits, gate}
{temperature, thermal, energy}
{theory, mechanics, state}
{vol, operators, histories}
{phase, path, phys}
{error, code, errors}
{equation, function, exp}
{bell, inequality, local}
{cos, sin, state}