| related words |
| insecurity |
| cryptosystem |
| decryption |
| encrypting |
| untagged |
| decrypt |
| vernam |
| attacker |
| sifting |
| eurocrypt |
| mother |
| adversarys |
| bessette |
| nordholt |
| nonrandom |
| commitments |
| cryptosystems |
| sealing |
| renner |
| recipient |
|
| related documents |
| An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Possibility, Impossibility and Cheat-Sensitivity of Quantum Bit String
Commitment [0504078v2] |
| On the interpretation of quantum theory - from Copenhagen to the present
day [0210152v1] |
| The Bell-Kochen-Specker Theorem [0308114v1] |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
|
| related topics |
| {key, protocol, security} |
| {theory, mechanics, state} |
| {particle, mechanics, theory} |
| {alice, bob, state} |
| {measurement, state, measurements} |
| {let, theorem, proof} |
| {states, state, optimal} |
| {time, decoherence, evolution} |
| {observables, space, algebra} |
| {information, entropy, channel} |
| {energy, gaussian, time} |
| {field, particle, equation} |
| {algorithm, log, probability} |
| {temperature, thermal, energy} |
| {vol, operators, histories} |
| {bell, inequality, local} |
| {phase, path, phys} |
| {group, space, representation} |
| {force, casimir, field} |
| {cavity, atom, atoms} |
|