| related words |
| cheats |
| sealing |
| nordholt |
| breeding |
| achievability |
| attacker |
| bessette |
| decrypt |
| vernam |
| sifting |
| password |
| malicious |
| untagged |
| cheaters |
| authenticate |
| partys |
| intercepted |
| unassisted |
| adversarys |
| cheater |
|
| related documents |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
| Experimental Quantum Key Distribution with Decoy States [0503192v4] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Multi-particle and High-dimension Controlled Order Rearrangement
Encryption Protocols [0701091v1] |
| Secure key from bound entanglement [0309110v2] |
| New Approach to Quantum Key Distribution Via Quantum Encryption [0604185v1] |
| Lower and upper bounds on the secret key rate for QKD protocols using
one--way classical communication [0410215v2] |
| Simple security proof of quantum key distribution via uncertainty
principle [0505108v1] |
|
| related topics |
| {key, protocol, security} |
| {alice, bob, state} |
| {state, states, entangled} |
| {photon, photons, single} |
| {states, state, optimal} |
| {state, phys, rev} |
| {entanglement, phys, rev} |
| {group, space, representation} |
| {information, entropy, channel} |
| {time, systems, information} |
| {light, field, probe} |
| {qubit, qubits, gate} |
| {temperature, thermal, energy} |
| {theory, mechanics, state} |
| {vol, operators, histories} |
| {phase, path, phys} |
| {error, code, errors} |
| {equation, function, exp} |
| {bell, inequality, local} |
| {cos, sin, state} |
|