暂无分享,去创建一个
David Elkouss | Vicente Martin | Jesús Martínez-Mateo | David Elkouss | V. Martín | J. Martínez-Mateo
[1] Shun Watanabe,et al. Key rate of quantum key distribution with hashed two-way classical communication , 2007, 2007 IEEE International Symposium on Information Theory.
[2] Robert G. Gallager,et al. Claude E. Shannon: A retrospective on his life, work, and impact , 2001, IEEE Trans. Inf. Theory.
[3] J. Neumann. Mathematische grundlagen der Quantenmechanik , 1935 .
[4] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[5] Physical Review , 1965, Nature.
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] M. Hayashi,et al. Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths , 2011, 1107.0589.
[8] Renato Renner,et al. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.
[9] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[10] Sébastien Kunz-Jacques,et al. Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation , 2011, Physical Review A.
[11] Rüdiger L. Urbanke,et al. The capacity of low-density parity-check codes under message-passing decoding , 2001, IEEE Trans. Inf. Theory.
[12] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[13] Marco Tomamichel,et al. Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.
[14] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[15] Marco Tomamichel,et al. Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.
[16] Valerio Scarani,et al. Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.
[17] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[18] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[19] Sergey Sorokin,et al. Manifold cities: social variables of urban areas in the UK , 2018, Proceedings of the Royal Society A.
[20] R. Renner,et al. Uncertainty relation for smooth entropies. , 2010, Physical review letters.
[21] L. Goddard. Information Theory , 1962, Nature.
[22] Xiongfeng Ma,et al. Practical issues in quantum-key-distribution postprocessing , 2009, 0910.0312.
[23] H. Weinfurter,et al. The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.
[24] A. Winter,et al. Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[25] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[26] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[27] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[28] Ueli Maurer,et al. Small accessible quantum information does not imply security. , 2007, Physical review letters.
[29] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[30] Shlomo Shamai,et al. Nested linear/Lattice codes for structured multiterminal binning , 2002, IEEE Trans. Inf. Theory.
[31] Mark F. Flanagan,et al. International Symposium on Information Theory and its Applications (ISITA 2008) , 2008 .
[32] Robert B. Ash,et al. Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[33] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[34] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[35] R. Stephenson. A and V , 1962, The British journal of ophthalmology.