共 12 条
- [1] Alshammari H., 2014, IEEE Long Island Systems, Applications and Technology (LISAT) Conference 2014, P1
- [2] Cobourne S., 2011, Quantum Key Distribution Protocols and Applications
- [4] Practical issues in quantum-key-distribution postprocessing [J]. PHYSICAL REVIEW A, 2010, 81 (01):
- [5] Geihs M., 2019, IEEE T SUST COMPUT
- [6] PUBLIC-KEY CRYPTOSYSTEM DESIGN BASED ON FACTORING AND DISCRETE LOGARITHMS [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (03): : 193 - 195
- [7] Concise security bounds for practical decoy-state quantum key distribution [J]. PHYSICAL REVIEW A, 2014, 89 (02):
- [8] Theoretically efficient high-capacity quantum-key-distribution scheme [J]. PHYSICAL REVIEW A, 2002, 65 (03): : 3
- [9] McCurley KS, 1990, P S APPL MATH, V42, P49
- [10] Onyinyechi N., 2015, REAL TIME SIMULATION