共 21 条
[1]
Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
[2]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[4]
Security of two quantum cryptography protocols using the same four qubit states
[J].
PHYSICAL REVIEW A,
2005, 72 (03)
[5]
BRASSARD G, 1993, AN S FDN CO, P362
[6]
Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
[7]
Damgård IB, 2007, LECT NOTES COMPUT SC, V4622, P342
[9]
FUCHS CA, ARXIVQUANTPH9601020