共 17 条
[2]
Bennett C. H., 1984, IBM Technical Disclosure Bulletin, V26, P4363
[3]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[6]
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[7]
Upper bounds of eavesdropper's performances in finite-length code with the decoy method
[J].
PHYSICAL REVIEW A,
2007, 76 (01)
[9]
KATO G, ARXIV10084663QUANTPH
[10]
Koashi M., ARXIVQUANTPH0507154