| related words |
| randomize |
| breeding |
| achievability |
| sealing |
| nordholt |
| authenticate |
| intercepted |
| tamaki |
| cheaters |
| password |
| attacker |
| verifiers |
| cheater |
| unassisted |
| sifting |
| vernam |
| malicious |
| untagged |
| decrypt |
| cheats |
|
| related documents |
| Quantum authentication protocol [0001046v1] |
| Systematic Analysis of Majorization in Quantum Algorithms [0212094v2] |
| Finding Solutions to NP Problems: Philosophical Difference Between
Quantum and Evolutionary Search Algorithms [0010021v1] |
| Quantum Philosophy: The Flight from Reason in Science [9601007v1] |
| A de Finetti representation for finite symmetric quantum states [0410229v1] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol [9702002v1] |
| How Stands Collapse I [0611211v1] |
| Expanded Conclusive Eavesdropping in Quantum Key Distribution [0509211v1] |
| Book Review: 'A New Kind of Science' [0206089v2] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
|
| related topics |
| {key, protocol, security} |
| {state, algorithm, problem} |
| {particle, mechanics, theory} |
| {algorithm, log, probability} |
| {theory, mechanics, state} |
| {alice, bob, state} |
| {measurement, state, measurements} |
| {let, theorem, proof} |
| {time, systems, information} |
| {bell, inequality, local} |
| {states, state, optimal} |
| {information, entropy, channel} |
| {photon, photons, single} |
| {energy, gaussian, time} |
| {state, phys, rev} |
| {qubit, qubits, gate} |
| {light, field, probe} |
| {state, states, entangled} |
| {time, wave, function} |
| {time, decoherence, evolution} |
|