Upgrading PPP security by Quantum Key Distribution
暂无分享,去创建一个
[1] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[2] Christoph Guenther. The Relevance of Quantum Cryptography in Modern Cryptographic Systems , 2004 .
[3] R. All'eaume. Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique , 2004 .
[4] Kenneth G. Paterson,et al. Why Quantum Cryptography , 2004 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Richard J. Hughes,et al. Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.
[7] Charles H. Bennett,et al. Quantum cryptography: uncertainty in the service of privacy. , 1992, Science.
[8] D. Bethune,et al. Autocompensating quantum cryptography , 2002, quant-ph/0204144.
[9] MayersDominic. Unconditional security in quantum cryptography , 2001 .
[10] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[11] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[12] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[13] Chip Elliott,et al. Quantum cryptography in practice , 2003, SIGCOMM '03.
[14] N. Cerf,et al. Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.
[15] C. Elliott. Building the quantum network* , 2002 .
[16] A. Mink,et al. Quantum key distribution with 1.25 Gbps clock synchronization , 2004, InternationalQuantum Electronics Conference, 2004. (IQEC)..
[17] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.