vernam

related words
untagged
decrypt
attacker
decryption
cryptosystem
sifting
insecurity
nordholt
sealing
adversarys
encrypting
bessette
tamaki
breeding
achievability
eurocrypt
concealing
unassisted
mother
chords
related documents
Detecting two-party quantum correlations in quantum key distribution protocols [0409047v1]
Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution [0302033v2]
Unambiguous state discrimination in quantum cryptography with weak coherent states [9910106v2]
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states [0609094v1]
The effect of multi-pair signal states in quantum cryptography with entangled photons [0011007v1]
From quantum-codemaking to quantum code-breaking [9703035v1]
Quantum Key Distribution using Two Coherent States of Light and their Superposition [9911035v2]
Randomizing quantum states: Constructions and applications [0307104v3]
Private Quantum Channels and the Cost of Randomizing Quantum Information [0003101v2]
Limits and restrictions of private quantum channel [0506107v1]
related topics
{key, protocol, security}
{alice, bob, state}
{photon, photons, single}
{bell, inequality, local}
{state, states, entangled}
{cos, sin, state}
{states, state, optimal}
{information, entropy, channel}
{algorithm, log, probability}
{entanglement, phys, rev}
{error, code, errors}
{particle, mechanics, theory}
{operator, operators, space}
{theory, mechanics, state}
{state, states, coherent}
{observables, space, algebra}
{light, field, probe}
{state, phys, rev}
{qubit, qubits, gate}
{temperature, thermal, energy}