共 38 条
- [2] Bennett C. H., 1984, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, P175, DOI [10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2014.05.025]
- [5] Passive Decoy-State Quantum Key Distribution with Coherent Light [J]. ENTROPY, 2015, 17 (06) : 4064 - 4082
- [6] Finite-key analysis for measurement-device-independent quantum key distribution [J]. NATURE COMMUNICATIONS, 2014, 5
- [8] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
- [9] Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J]. NATURE COMMUNICATIONS, 2011, 2
- [10] Reexamination of the decoy-state quantum key distribution with an unstable source [J]. PHYSICAL REVIEW A, 2010, 82 (01):