A Talk on Quantum Cryptography or How Alice Outwits Eve
暂无分享,去创建一个
[1] Simon J. D. Phoenix,et al. Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .
[2] J. Rarity,et al. Single photon interference in 10 km long optical fibre interferometer , 1993 .
[3] C. G. Peterson,et al. Practical quantum cryptography for secure free-space communications , 1999 .
[4] Samuel J. Lomonaco,et al. A Quick Glance at Quantum Cryptography , 1998, Cryptologia.
[5] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[6] J. Franson,et al. Quantum cryptography in free space. , 1996, Optics letters.
[7] Paul G. Kwiat,et al. Quantum cryptography for secure free-space communications , 1999, Photonics West.
[8] P. Townsend. Secure key distribution system based on quantum cryptography , 1994 .
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] H. F. Chau,et al. Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances , 1998, IACR Cryptol. ePrint Arch..
[11] Paul D. Townsend,et al. A Quantum Key Distribution Channel Based on Optical Fibre , 1994 .
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] J. Franson,et al. Quantum Cryptography Using Polarization Feedback , 1994 .
[14] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[15] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[16] John Myers,et al. ASPECTS OF ENTANGLED TRANSLUCENT EAVESDROPPING IN QUANTUM CRYPTOGRAPHY , 1997 .
[17] Andrew Chi-Chih Yao,et al. Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[18] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[19] Peterson,et al. Daylight quantum key distribution over 1.6 km , 2000, Physical review letters.
[20] Paul D. Townsend,et al. Quantum cryptography on multiuser optical fibre networks , 1997, Nature.
[21] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.