共 25 条
[1]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]
Security of two quantum cryptography protocols using the same four qubit states
[J].
PHYSICAL REVIEW A,
2005, 72 (03)
[4]
Limitations on practical quantum cryptography
[J].
PHYSICAL REVIEW LETTERS,
2000, 85 (06)
:1330-1333
[5]
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]
[6]
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[8]
Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy
[J].
PHYSICAL REVIEW A,
1997, 56 (02)
:1163-1172
[9]
GRAHAMROWE D, 2009, TECHNOL REV, V8
[10]
Differential phase shift quantum key distribution
[J].
PHYSICAL REVIEW LETTERS,
2002, 89 (03)
:379021-379023