Mathematics
Attack
86%
Qubit
38%
Signature Scheme
32%
Authentication
28%
Communication Protocol
28%
Quantum Communication
27%
Receiver
24%
GHZ State
23%
Identity-based
23%
Photon
23%
Entangled State
22%
Secure Communication
22%
Dialogue
21%
Communication
19%
Authentication Protocol
19%
Key Agreement Protocol
17%
Key Distribution
17%
Entanglement
16%
Password Authentication
16%
Password
14%
Threshold Signature
14%
Cryptosystem
12%
Multisignature
12%
Blind Signature
12%
Signature
12%
Group Signature
10%
Key Agreement
10%
Quantum Teleportation
10%
Proxy Signature
9%
Intercept
9%
Server
9%
Mutual Authentication
9%
Coding
8%
Controller
8%
Distribution System
8%
Quantum Dynamics
7%
Decoherence
7%
Cluster State
7%
Quantum Algorithms
7%
Group Scheme
6%
Equality
6%
Authenticated Key Exchange
6%
Search Algorithm
6%
Engineering & Materials Science
Authentication
67%
Qubits
48%
Network protocols
47%
Quantum cryptography
46%
Cryptography
42%
Communication
25%
Quantum communication
24%
Photons
24%
Electronic document identification systems
22%
Secure communication
20%
Servers
11%
Internet of things
11%
Factorization
9%
Quantum channel
8%
Paramagnetic resonance
8%
Shareholders
8%
Quantum entanglement
7%
Access control
7%
Quantum noise
6%
Malware
6%
Denial-of-service attack
6%
Controllers
6%
Internet
5%
Decoding
5%
Physics & Astronomy
attack
100%
messages
49%
communication
34%
bells
31%
quantum communication
28%
photons
19%
receivers
17%
coding
16%
channel noise
13%
controllers
11%
signatures
10%
quantum cryptography
9%
leakage
8%
chin
8%
augmentation
5%
decoys
5%