| related words |
| insecurity |
| encrypting |
| cryptosystem |
| decryption |
| untagged |
| decrypt |
| vernam |
| concealing |
| attacker |
| sifting |
| eurocrypt |
| secoqc |
| adversarys |
| tagged |
| bessette |
| nordholt |
| nonrandom |
| cryptosystems |
| renner |
| recipient |
|
| related documents |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
| Cheat Sensitive Quantum Bit Commitment [9911043v5] |
| Coherent states, entanglement, and geometric invariant theory [0206012v1] |
| Canonical and micro-canonical typical entanglement of continuous
variable systems [0701051v2] |
| Why the quantum? [0402149v1] |
|
| related topics |
| {key, protocol, security} |
| {states, state, optimal} |
| {energy, gaussian, time} |
| {group, space, representation} |
| {state, states, entangled} |
| {alice, bob, state} |
| {theory, mechanics, state} |
| {information, entropy, channel} |
| {let, theorem, proof} |
| {entanglement, phys, rev} |
| {observables, space, algebra} |
| {particle, mechanics, theory} |
| {operator, operators, space} |
| {field, particle, equation} |
| {classical, space, random} |
| {measurement, state, measurements} |
| {bell, inequality, local} |
| {error, code, errors} |
| {temperature, thermal, energy} |
| {trap, ion, state} |
|