| related words |
| cryptosystems |
| maurer |
| salvail |
| recipient |
| commit |
| ciphertext |
| ciphers |
| authenticated |
| renner |
| encrypting |
| encrypt |
| announcement |
| secrecy |
| nonrandom |
| insecurity |
| trojan |
| secoqc |
| ballot |
| encrypted |
| unveiling |
|
| related documents |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Security of quantum key distribution protocol with two-way classical
communication assisted by one-time pad encryption [0608030v3] |
| Effects of single-qubit quantum noise on entanglement purification [0505177v3] |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| Fundamental gravitational limitations to quantum computing [0507262v1] |
| Quantum and Classical Noise in Practical Quantum Cryptography Systems
based on polarization-entangled photons [0205142v2] |
| Practical Scheme To Share A Secret Key Through An Up To 27.6% Bit Error
Rate Quantum Channel [0205060v3] |
| Robustness of Shor's algorithm [0408081v5] |
| Anyons from non-solvable finite groups are sufficient for universal
quantum computation [0206128v2] |
| Nearly ideal binary communication in squeezed channels [0104057v1] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Always On Non-Nearest-Neighbor Coupling in Scalable Quantum Computing [0605175v1] |
| Coordinating quantum agents' perspectives: convex operational theories,
quantum information, and quantum foundations [0611110v1] |
| Local Search Methods for Quantum Computers [9802043v1] |
| Non-local Operations: Purification, storage, compression, tomography,
and probabilistic implementation [0012148v1] |
| Ex-house 2D finite-element simulation of the whispering-gallery modes of
arbitrarily shaped axisymmetric electromagnetic resonators [0607156v2] |
| Improving quantum interferometry by using entanglement (to take a
decision you'd better use entanglement) [0110105v1] |
| Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
| Shortening Grover's search algorithm for an expectation value quantum
computer [0209148v1] |
|
| related topics |
| {key, protocol, security} |
| {qubit, qubits, gate} |
| {state, algorithm, problem} |
| {cavity, atom, atoms} |
| {alice, bob, state} |
| {observables, space, algebra} |
| {photon, photons, single} |
| {algorithm, log, probability} |
| {error, code, errors} |
| {theory, mechanics, state} |
| {time, decoherence, evolution} |
| {temperature, thermal, energy} |
| {time, systems, information} |
| {state, states, coherent} |
| {cos, sin, state} |
| {state, phys, rev} |
| {states, state, optimal} |
| {force, casimir, field} |
| {information, entropy, channel} |
| {spin, pulse, spins} |
|