共 19 条
[1]
Ben-Or M, 2005, LECT NOTES COMPUT SC, V3378, P386
[2]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]
Bennett C. H., 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[4]
Generalized privacy amplification
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1995, 41 (06)
:1915-1923
[6]
BENNETT CH, 1986, LECT NOTES COMPUT SC, V218, P468
[7]
Limitations on practical quantum cryptography
[J].
PHYSICAL REVIEW LETTERS,
2000, 85 (06)
:1330-1333
[8]
BRASSARD G, 1994, ADV CRYPTOLOGY EUROC, V765, P410
[9]
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[10]
QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
[J].
PHYSICAL REVIEW LETTERS,
1991, 67 (06)
:661-663