共 63 条
- [1] Abushgra A., 2015, 2015 Long Island Systems, Applications and Technology, P1
- [2] Abushgra A., DIFFERENTIATIONS QKD
- [3] SARG04 and AK15 Protocols Based on the Run-Time Execution and QBER [J]. 2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 176 - 180
- [4] [Anonymous], P INT C INF COMM SEC
- [5] [Anonymous], 2011, CRYPTOGRAPHY INFORM
- [6] Barker W.C., 2012, 80067REV1 SP CIT
- [7] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
- [9] Brassard G, 2005, 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, P19
- [10] Quantum copying: Beyond the no-cloning theorem [J]. PHYSICAL REVIEW A, 1996, 54 (03): : 1844 - 1852