| related words |
| generation |
| generate |
| successful |
| practical |
| implementation |
| achieve |
| imperfect |
| realization |
| protocols |
| advantage |
| implemented |
| ekert |
| technology |
| stored |
| storage |
| successfully |
| manipulation |
| propose |
| implement |
| purification |
|
| related documents |
| SECOQC White Paper on Quantum Key Distribution and Cryptography [0701168v1] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Unconditionally Secure Key Distribution In Higher Dimensions By
Depolarization [0405016v2] |
| Quantum optical implementation of quantum information processing [0405030v1] |
| Construction of a Scalable, Uniform and Universal Quantum Network and
Its Applications [0006122v2] |
| Synthesizing arbitrary two-photon polarization mixed states [0501115v1] |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
| All Teleportation and Dense Coding Schemes [0003070v1] |
| Three-dimensional theory for interaction between atomic ensembles and
free-space light [0205005v1] |
| Improved Lower Bounds for Locally Decodable Codes and Private
Information Retrieval [0403140v2] |
| Always On Non-Nearest-Neighbor Coupling in Scalable Quantum Computing [0605175v1] |
| Macroscopic mechanical oscillators at the quantum limit using
optomechanical cooling [0211102v1] |
| Selective pulse implementation of two-qubit gates for spin-3/2 based
fullerene quantum information processing [0311178v2] |
| Theory of four-wave mixing and accompanying dissociation and population
transfer controlled with laser-induced continuum structures [0302021v2] |
| Fault-tolerant quantum repeaters with minimal physical resources, and
implementations based on single photon emitters [0502112v1] |
| NMR Quantum Computation: a Critical Evaluation [0002085v1] |
| Generalized Measurement and Conclusive Teleportation with Nonmaximal
Entanglement [0404172v1] |
| Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed
States [0611145v1] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Unconditionally Secure Commitment of a Certified Classical Bit is
Impossible [9910087v2] |
|
| related topics |
| {state, phys, rev} |
| {key, protocol, security} |
| {alice, bob, state} |
| {qubit, qubits, gate} |
| {spin, pulse, spins} |
| {level, atom, field} |
| {time, decoherence, evolution} |
| {photon, photons, single} |
| {trap, ion, state} |
| {state, states, coherent} |
| {error, code, errors} |
| {light, field, probe} |
| {cavity, atom, atoms} |
| {vol, operators, histories} |
| {temperature, thermal, energy} |
| {measurement, state, measurements} |
| {phase, path, phys} |
| {state, states, entangled} |
| {group, space, representation} |
| {observables, space, algebra} |
|