| related words |
| anonymous |
| committed |
| trusted |
| announced |
| unconditionally |
| hashing |
| establishment |
| authentication |
| insecure |
| mayers |
| encrypted |
| honest |
| cryptology |
| hiding |
| encrypt |
| eavesdroppers |
| revealing |
| ltkenhaus |
| tossing |
| cipher |
|
| related documents |
| Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution [0302033v2] |
| Quantum authentication protocol [0001046v1] |
| Improving the security of secure direct communication based on secret
transmitting order of particles [0612016v1] |
| Quantum Key Distribution using Two Coherent States of Light and their
Superposition [9911035v2] |
| Expanded Conclusive Eavesdropping in Quantum Key Distribution [0509211v1] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| From quantum-codemaking to quantum code-breaking [9703035v1] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Improvement of quantum key distribution protocols [9810021v1] |
| Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
| Security of classical noise-based cryptography [0002044v2] |
| Violating Bell's inequality beyond Cirel'son's bound [0108084v2] |
| Evaluable multipartite entanglement measures: are multipartite
concurrences entanglement monotones? [0607084v2] |
| Algebras of Measurements: the logical structure of Quantum Mechanics [0507231v2] |
| Generation and Suppression of Decoherence in Artificial Environment for
Qubit System [0608134v3] |
| Two qubit copying machine for economical quantum eavesdropping [9810008v2] |
| The Pondicherry interpretation of quantum mechanics [9903051v3] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Distinguishability and Accessible Information in Quantum Theory [9601020v1] |
| Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
|
| related topics |
| {key, protocol, security} |
| {theory, mechanics, state} |
| {energy, gaussian, time} |
| {entanglement, phys, rev} |
| {vol, operators, histories} |
| {alice, bob, state} |
| {cos, sin, state} |
| {observables, space, algebra} |
| {bell, inequality, local} |
| {level, atom, field} |
| {time, decoherence, evolution} |
| {state, states, entangled} |
| {time, systems, information} |
| {operator, operators, space} |
| {state, algorithm, problem} |
| {let, theorem, proof} |
| {states, state, optimal} |
| {spin, pulse, spins} |
| {time, wave, function} |
| {measurement, state, measurements} |
|