共 24 条
- [1] Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography [J]. PHYSICAL REVIEW A, 1999, 59 (06): : 4238 - 4248
- [2] Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
- [3] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
- [4] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
- [5] Optimal eavesdropping in quantum cryptography with six states [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021
- [6] Cloning of continuous quantum variables [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (08) : 1754 - 1757
- [7] Optimal N-to-M cloning of conjugate quantum variables -: art. no. 040301 [J]. PHYSICAL REVIEW A, 2000, 62 (04): : 3
- [8] Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
- [9] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
- [10] Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy [J]. PHYSICAL REVIEW A, 1997, 56 (02): : 1163 - 1172