| related words |
| assche |
| sealing |
| nordholt |
| breeding |
| achievability |
| tamaki |
| attacker |
| vernam |
| sifting |
| decrypt |
| untagged |
| password |
| unassisted |
| cheaters |
| cheats |
| authenticate |
| bessette |
| adversarys |
| decryption |
| cryptosystem |
|
| related documents |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Cotangent bundle quantization: Entangling of metric and magnetic field [0505144v2] |
| Semiclassical propagator of the Wigner function [0508057v2] |
|
| related topics |
| {key, protocol, security} |
| {phase, path, phys} |
| {group, space, representation} |
| {alice, bob, state} |
| {states, state, optimal} |
| {equation, function, exp} |
| {time, wave, function} |
| {let, theorem, proof} |
| {field, particle, equation} |
| {cos, sin, state} |
| {classical, space, random} |
| {observables, space, algebra} |
| {level, atom, field} |
| {energy, state, states} |
| {algorithm, log, probability} |
| {state, states, entangled} |
| {bell, inequality, local} |
| {operator, operators, space} |
| {light, field, probe} |
| {time, decoherence, evolution} |
|