共 30 条
[2]
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
[J].
PHYSICAL REVIEW A,
1999, 59 (06)
:4238-4248
[4]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[6]
Security of two quantum cryptography protocols using the same four qubit states
[J].
PHYSICAL REVIEW A,
2005, 72 (03)
[8]
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[9]
Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses -: art. no. 062301
[J].
PHYSICAL REVIEW A,
2005, 71 (06)
[10]
QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
[J].
PHYSICAL REVIEW LETTERS,
1991, 67 (06)
:661-663