Mathematics
Attack
86%
Authenticated Key Exchange
6%
Authentication
28%
Authentication Protocol
19%
Blind Signature
12%
Cluster State
7%
Coding
8%
Communication
19%
Communication Protocol
28%
Controller
8%
Cryptosystem
12%
Decoherence
7%
Dialogue
21%
Distribution System
8%
Entangled State
22%
Entanglement
16%
Equality
6%
GHZ State
23%
Group Scheme
6%
Group Signature
10%
Identity-based
23%
Intercept
9%
Key Agreement
10%
Key Agreement Protocol
17%
Key Distribution
17%
Multisignature
12%
Mutual Authentication
9%
Password
14%
Password Authentication
16%
Photon
23%
Proxy Signature
9%
Quantum Algorithms
7%
Quantum Communication
27%
Quantum Dynamics
7%
Quantum Teleportation
10%
Qubit
38%
Receiver
24%
Search Algorithm
6%
Secure Communication
22%
Server
9%
Signature
12%
Signature Scheme
32%
Threshold Signature
14%
Engineering & Materials Science
Access control
7%
Authentication
64%
Communication
25%
Controllers
6%
Cryptography
42%
Decoding
5%
Denial-of-service attack
6%
Electronic document identification systems
22%
Factorization
9%
Internet
5%
Internet of things
7%
Malware
6%
Network protocols
45%
Paramagnetic resonance
8%
Photons
24%
Quantum channel
8%
Quantum communication
24%
Quantum cryptography
46%
Quantum entanglement
7%
Quantum noise
6%
Qubits
48%
Secure communication
20%
Servers
10%
Shareholders
8%
Physics & Astronomy
attack
100%
augmentation
5%
bells
31%
channel noise
13%
chin
8%
coding
16%
communication
34%
controllers
11%
decoys
5%
leakage
8%
messages
49%
photons
19%
quantum communication
28%
quantum cryptography
9%
receivers
17%
signatures
10%