共 30 条
[1]
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
[J].
PHYSICAL REVIEW A,
1999, 59 (06)
:4238-4248
[2]
Quantum cryptography with 3-state systems
[J].
PHYSICAL REVIEW LETTERS,
2000, 85 (15)
:3313-3316
[3]
BECHMANNPASQUIN.W, 2000, PHYS REV A, V61, DOI ARTN 062308
[4]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[5]
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[6]
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[7]
BOURENNANE M, 2001, PHYS REV A, V64
[8]
Quantum-information distributors: Quantum network for symmetric and asymmetric cloning in arbitrary dimension and continuous limit
[J].
PHYSICAL REVIEW A,
2001, 63 (05)
:523131-5231310