共 25 条
- [1] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
- [2] Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
- [3] Security of two quantum cryptography protocols using the same four qubit states [J]. PHYSICAL REVIEW A, 2005, 72 (03):
- [4] Limitations on practical quantum cryptography [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
- [5] Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]
- [6] CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
- [7] Optical networking for quantum key distribution and quantum communications [J]. NEW JOURNAL OF PHYSICS, 2009, 11
- [8] Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy [J]. PHYSICAL REVIEW A, 1997, 56 (02): : 1163 - 1172
- [9] GRAHAMROWE D, 2009, TECHNOL REV, V8
- [10] Differential phase shift quantum key distribution [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (03) : 379021 - 379023