Mathematics
Attack
87%
Qubit
38%
Signature Scheme
33%
Authentication
29%
Communication Protocol
28%
Quantum Communication
27%
Receiver
24%
GHZ State
24%
Identity-based
23%
Photon
23%
Entangled State
23%
Secure Communication
22%
Dialogue
21%
Communication
20%
Authentication Protocol
19%
Key Agreement Protocol
17%
Key Distribution
17%
Entanglement
17%
Password Authentication
16%
Password
15%
Threshold Signature
14%
Cryptosystem
13%
Multisignature
12%
Blind Signature
12%
Signature
12%
Group Signature
11%
Key Agreement
10%
Quantum Teleportation
10%
Proxy Signature
9%
Intercept
9%
Server
9%
Mutual Authentication
9%
Coding
9%
Controller
8%
Distribution System
8%
Quantum Dynamics
8%
Decoherence
8%
Cluster State
7%
Quantum Algorithms
7%
Group Scheme
6%
Equality
6%
Authenticated Key Exchange
6%
Search Algorithm
6%
Engineering & Materials Science
Authentication
64%
Qubits
45%
Network protocols
44%
Cryptography
43%
Quantum cryptography
42%
Communication
25%
Quantum communication
25%
Photons
24%
Electronic document identification systems
23%
Secure communication
20%
Servers
10%
Factorization
9%
Paramagnetic resonance
8%
Shareholders
8%
Quantum channel
8%
Internet of things
7%
Quantum entanglement
7%
Access control
7%
Quantum noise
6%
Malware
6%
Denial-of-service attack
6%
Controllers
6%
Decoding
5%
Physics & Astronomy
attack
100%
messages
50%
communication
35%
bells
32%
quantum communication
29%
photons
20%
receivers
17%
coding
16%
channel noise
14%
controllers
12%
signatures
10%
quantum cryptography
9%
leakage
8%
chin
8%
augmentation
5%
decoys
5%