| related words |
| encrypting |
| insecurity |
| cryptosystem |
| decryption |
| decrypt |
| untagged |
| vernam |
| concealing |
| bessette |
| nonrandom |
| cryptosystems |
| eurocrypt |
| attacker |
| sifting |
| unveil |
| salvail |
| recipient |
| reconciliation |
| adversarys |
| renner |
|
| related documents |
| Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long
Distances [9803006v5] |
| Security of Quantum Key Distribution with Entangled Photons Against
Individual Attacks [0012078v1] |
| Method for decoupling error correction from privacy amplification [0201030v1] |
| Experimental Quantum Key Distribution with Decoy States [0503192v4] |
| Single photon generation by pulsed excitation of a single dipole [0007037v1] |
| Unconditional Security of Practical Quantum Key Distribution [0402170v1] |
| Unifying classical and quantum key distillation [0608199v3] |
| Mimicking a Squeezed Bath Interaction: Quantum Reservoir Engineering
with Atoms [9706031v1] |
| Quantum Key Distribution with High Loss: Toward Global Secure
Communication [0211153v5] |
| Unambiguous state discrimination in quantum cryptography with weak
coherent states [9910106v2] |
| Percolation, renormalization, and quantum computing with
non-deterministic gates [0611140v3] |
| Generalized decoding, effective channels, and simplified security proofs
in quantum key distribution [0505061v3] |
| Security of classical noise-based cryptography [0002044v2] |
| Upper bounds on success probabilities in linear optics [0403103v1] |
| Teleportation: from probability distributions to quantum states [0011083v2] |
| Eavesdropping on the "ping-pong" type quantum communication protocols
with invisible photon [0508002v2] |
| Sequential attacks against differential-phase-shift quantum key
distribution with weak coherent states [0609094v1] |
| Implementation of projective measurements with linear optics and
continuous photon counting [0410133v2] |
| Detecting two-party quantum correlations in quantum key distribution
protocols [0409047v1] |
| Physical Purification of Quantum States [0509100v3] |
|
| related topics |
| {key, protocol, security} |
| {state, phys, rev} |
| {state, states, entangled} |
| {state, states, coherent} |
| {states, state, optimal} |
| {state, algorithm, problem} |
| {level, atom, field} |
| {alice, bob, state} |
| {photon, photons, single} |
| {trap, ion, state} |
| {entanglement, phys, rev} |
| {bell, inequality, local} |
| {information, entropy, channel} |
| {qubit, qubits, gate} |
| {algorithm, log, probability} |
| {observables, space, algebra} |
| {equation, function, exp} |
| {error, code, errors} |
| {let, theorem, proof} |
| {time, decoherence, evolution} |
|