related words |
cheats |
sealing |
nordholt |
breeding |
achievability |
attacker |
bessette |
decrypt |
vernam |
sifting |
password |
malicious |
untagged |
cheaters |
authenticate |
partys |
intercepted |
unassisted |
adversarys |
cheater |
|
related documents |
Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
Experimental Quantum Key Distribution with Decoy States [0503192v4] |
Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
Secure key from bound entanglement [0309110v2] |
New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1] |
Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
Simple security proof of quantum key distribution via uncertainty
principle [0505108v1] |
|
related topics |
{key, protocol, security} |
{alice, bob, state} |
{state, states, entangled} |
{photon, photons, single} |
{states, state, optimal} |
{state, phys, rev} |
{entanglement, phys, rev} |
{group, space, representation} |
{information, entropy, channel} |
{time, systems, information} |
{light, field, probe} |
{qubit, qubits, gate} |
{temperature, thermal, energy} |
{theory, mechanics, state} |
{vol, operators, histories} |
{phase, path, phys} |
{error, code, errors} |
{equation, function, exp} |
{bell, inequality, local} |
{cos, sin, state} |
|