| related words |
| sealing |
| attacker |
| breeding |
| achievability |
| vernam |
| tamaki |
| untagged |
| sifting |
| decrypt |
| decryption |
| adversarys |
| cryptosystem |
| unassisted |
| bessette |
| cheaters |
| authenticate |
| password |
| insecurity |
| cheats |
| chords |
|
| related documents |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Enhancing practical security of quantum key distribution with a few
decoy states [0503002v1] |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography [0111073v2] |
| Eavesdropper's Optimal Information in Variations of Bennett-Brassard
1984 Quantum Key Distribution in the Coherent Attacks [0009006v5] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| Single photon generation by pulsed excitation of a single dipole [0007037v1] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
|
| related topics |
| {key, protocol, security} |
| {photon, photons, single} |
| {alice, bob, state} |
| {state, states, entangled} |
| {state, phys, rev} |
| {spin, pulse, spins} |
| {level, atom, field} |
| {states, state, optimal} |
| {bell, inequality, local} |
| {time, wave, function} |
| {information, entropy, channel} |
| {light, field, probe} |
| {algorithm, log, probability} |
| {particle, mechanics, theory} |
| {entanglement, phys, rev} |
| {error, code, errors} |
| {cos, sin, state} |
| {time, systems, information} |
| {energy, gaussian, time} |
| {classical, space, random} |
|