共 40 条
- [2] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
- [3] Limitations on practical quantum cryptography [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
- [6] FerreiradaSilva T., 2013, PHYS REV A, V88
- [8] Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
- [9] Reexamination of the decoy-state quantum key distribution with an unstable source [J]. PHYSICAL REVIEW A, 2010, 82 (01):
- [10] Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states [J]. PHYSICAL REVIEW A, 2012, 86 (03):