trojan

related words
encrypt
encrypted
eavesdroppers
announcement
authentic
cryptosystems
bessette
encrypting
insecurity
receipt
cryptosystem
decrypt
salvail
decryption
recipient
cheats
renner
authenticated
untagged
concealing
related documents
A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2]
Improving the security of secure direct communication based on secret transmitting order of particles [0612016v1]
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances [9803006v5]
Eavesdropping on the "ping-pong" type quantum communication protocols with invisible photon [0508002v2]
A simple proof of the unconditional security of quantum key distribution [9904091v1]
SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1]
related topics
{key, protocol, security}
{alice, bob, state}
{photon, photons, single}
{state, phys, rev}
{error, code, errors}
{trap, ion, state}
{particle, mechanics, theory}
{bell, inequality, local}
{theory, mechanics, state}
{spin, pulse, spins}
{entanglement, phys, rev}
{state, states, entangled}
{algorithm, log, probability}
{cos, sin, state}
{time, systems, information}
{energy, gaussian, time}
{classical, space, random}
{force, casimir, field}
{state, states, coherent}
{qubit, qubits, gate}