共 36 条
[1]
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[2]
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[4]
Brassard G., 1993, Proceedings. 34th Annual Symposium on Foundations of Computer Science (Cat. No.93CH3368-8), P362, DOI 10.1109/SFCS.1993.366851
[5]
Brassard G., QUANTPH9712023
[6]
Chau HF, 1998, FORTSCHR PHYS, V46, P507, DOI 10.1002/(SICI)1521-3978(199806)46:4/5<507::AID-PROP507>3.0.CO
[7]
2-4
[9]
Crepeau C., 1995, Advances in Cryptology - EUROCRYPT '95. International Conference on the Theory and Application of Cryptographic Techniques. Proceedings, P133
[10]
Crepeau C, 1995, LECT NOTES COMPUT SC, V963, P110