| related words |
| cryptosystem |
| insecurity |
| decryption |
| untagged |
| sigact |
| decrypt |
| vernam |
| encrypting |
| attacker |
| sifting |
| concealing |
| adversarys |
| nordholt |
| bessette |
| tagged |
| composability |
| sealing |
| nonrandom |
| cryptosystems |
| tamaki |
|
| related documents |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
| Deutsch-Jozsa Algorithm Revisited in the Domain of Cryptographically
Significant Boolean Functions [0410042v1] |
| On the security of AlphaEta: Response to `Some attacks on quantum-based
cryptographic protocols' [0509091v3] |
| Unifying classical and quantum key distillation [0608199v3] |
| Secure key from bound entanglement [0309110v2] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| Quantum Digital Signatures [0105032v2] |
| Experimental Quantum Key Distribution with Decoy States [0503192v4] |
| Security of classical noise-based cryptography [0002044v2] |
| Method for decoupling error correction from privacy amplification [0201030v1] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Limits on Efficient Computation in the Physical World [0412143v2] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| An Unconditionally Secure Quantum Bit Commitment Scheme [0403036v5] |
|
| related topics |
| {key, protocol, security} |
| {algorithm, log, probability} |
| {alice, bob, state} |
| {state, states, entangled} |
| {let, theorem, proof} |
| {photon, photons, single} |
| {theory, mechanics, state} |
| {state, algorithm, problem} |
| {state, phys, rev} |
| {information, entropy, channel} |
| {error, code, errors} |
| {phase, path, phys} |
| {bell, inequality, local} |
| {states, state, optimal} |
| {wave, scattering, interference} |
| {light, field, probe} |
| {time, systems, information} |
| {entanglement, phys, rev} |
| {particle, mechanics, theory} |
| {classical, space, random} |
|