共 29 条
[2]
Antunes L., 2007, INT C INF THEOR SEC, P195
[3]
Babai L., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P337, DOI 10.1109/SFCS.1986.15
[4]
Bafna M, 2019, Disc Algorithms, P1861
[5]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[6]
An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications
[J].
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY,
2021, 2 (01)
:5-22
[8]
Distillation of secret key and entanglement from quantum states
[J].
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
2005, 461 (2053)
:207-235
[10]
Ding YZ, 2005, LECT NOTES COMPUT SC, V3378, P578