共 30 条
[2]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[7]
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[9]
Reexamination of the decoy-state quantum key distribution with an unstable source
[J].
PHYSICAL REVIEW A,
2010, 82 (01)