共 73 条
- [1] Bennett CH(1991)Experimental quantum cryptography J. Cryptol. 5 3-28
- [2] Bessette F(2002)Quantum cryptography Rev. Mod. Phys. 74 145-195
- [3] Brassard G(2005)Current status of the DARPA quantum network Proc. SPIE: Quantum Inf. Comput. III 5815 138-149
- [4] Salvail L(2000)Limitations on practical quantum cryptography Phys. Rev. Lett. 85 1330-708
- [5] Smolin J(2000)Security against individual attacks for realistic quantum key distribution Phys. Rev. A 61 052304-707
- [6] Gisin N(2005)Decoy state quantum key distribution Phys. Rev. Lett. 94 230504-4689
- [7] Ribordy G(2005)Beating the photon-number-splitting attack in practical quantum cryptography Phys. Rev. Lett. 94 230503-5430
- [8] Tittel W(2006)Experimental quantum key distribution with decoy states Phys. Rev. Lett. 96 070502-1458
- [9] Zbinden H(2009)The security of practical quantum key distribution Rev. Mod. Phys. 81 1301-1970
- [10] Elliott C(2013)Source attack of decoy-state quantum key distribution using phase information Phys. Rev. A 88 022308-11360