related words |
insecurity |
encrypting |
cryptosystem |
decryption |
untagged |
decrypt |
vernam |
concealing |
attacker |
sifting |
eurocrypt |
secoqc |
adversarys |
tagged |
bessette |
nordholt |
nonrandom |
cryptosystems |
renner |
recipient |
|
related documents |
Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
Cheat Sensitive Quantum Bit Commitment [9911043v5] |
Coherent states, entanglement, and geometric invariant theory [0206012v1] |
Canonical and micro-canonical typical entanglement of continuous
variable systems [0701051v2] |
Why the quantum? [0402149v1] |
|
related topics |
{key, protocol, security} |
{states, state, optimal} |
{energy, gaussian, time} |
{group, space, representation} |
{state, states, entangled} |
{alice, bob, state} |
{theory, mechanics, state} |
{information, entropy, channel} |
{let, theorem, proof} |
{entanglement, phys, rev} |
{observables, space, algebra} |
{particle, mechanics, theory} |
{operator, operators, space} |
{field, particle, equation} |
{classical, space, random} |
{measurement, state, measurements} |
{bell, inequality, local} |
{error, code, errors} |
{temperature, thermal, energy} |
{trap, ion, state} |
|