--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
I'm always stuck on that little step where Alice tells Bob what basis
she used for each photon sent. Tells him how? They need integrity
protection and endpoint authentication for N bits of basis. Is the
quantum trick converting those N bits to N/2 privacy-protected bits
really as exciting as it's made out to be?
- Re: Can Eve repeat? Peter Fairbrother
- Re: quantum hype Peter Fairbrother
- Re: quantum hype Peter Fairbrother
- Re: quantum hype Peter Fairbrother
- Re: quantum hype Dave Howe
- Re: quantum hype Andreas Gunnarsson
- Re: quantum hype Dave Howe
- Re: quantum hype starwars
- Re: quantum hype martin f krafft
- Re: quantum hype Victor . Duchovni
- Re: quantum hype Matt Crawford
- Re: quantum hype John S. Denker
- Threat models (was: quantum hype ) Steven M. Bellovin
- Re: quantum hype David Wagner
- Re: quantum hype Greg Troxel
- RE: quantum hype Michael_Heyman
- Re: quantum hype Peter Fairbrother
- Re: quantum hype Matt Crawford
- Re: quantum hype Peter Fairbrother
- Re: quantum hype Peter Fairbrother
