共 79 条
- [1] Rivest R(1978)A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-126
- [2] Shamir A(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM J. Comput. 26 1484-1509
- [3] Adleman L(1999)Design principles for tamper-resistant smartcard processors Smartcard 99 9-20
- [4] Shor PW(2000)Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 441-444
- [5] Kömmerling O(2009)The security of practical quantum key distribution Rev. Mod. Phys. 81 1301-1350
- [6] Kuhn MG(2002)Single photon quantum cryptography Phys. Rev. Lett. 89 187901-1551
- [7] Shor PW(2003)Long-distance quantum communication with entangled photons using satellites IEEE J. Sel. Topics Quantum Electron. 9 1541-2030
- [8] Preskill J(2002)Physical one-way functions Science 297 2026-1141
- [9] Scarani V(2014)Physical unclonable functions and applications: a tutorial Proc. IEEE 102 1126-3433
- [10] Beveratos A(2017)Security beyond CMOS: fundamentals, applications, and roadmap IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25 3420-2663