共 27 条
- [1] Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
- [2] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
- [3] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
- [4] Limitations on practical quantum cryptography [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
- [7] BUTTLER WT, QUANTPH020398
- [9] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
- [10] Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy [J]. PHYSICAL REVIEW A, 1997, 56 (02): : 1163 - 1172