Quantum Cryptography
暂无分享,去创建一个
Sujatha Krishnamoorthy | Varsha Sahni | Mudassir Khan | S. Venkata Lakshmi | Neeraj Kumar | V. Sahni | S. Krishnamoorthy | Mudassir Khan | N. Kumar | S. Lakshmi
[1] Dominic Mayers,et al. Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.
[2] H. Bechmann-Pasquinucci,et al. Quantum Cryptography using larger alphabets , 1999, quant-ph/9910095.
[3] Dim Coherent States as Signal States in the Bb84 Protocol: Is it Secure? , 2002 .
[4] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[5] H Bechmann-Pasquinucci,et al. Quantum cryptography with 3-state systems. , 2000, Physical review letters.
[6] N. Lütkenhaus. submitted toacta physica slovaca SECURITY OF QUANTUM CRYPTOGRAPHY WITH REALISTIC SOURCES , 1999 .
[7] Barry C. Sanders,et al. II Quantum Phenomena in Optical Interferometry , 1996 .
[8] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[9] E. Jaynes,et al. Comparison of quantum and semiclassical radiation theories with application to the beam maser , 1962 .
[10] Y. Yamamoto,et al. A single-photon turnstile device , 1999, Nature.
[11] J. Bell. On the Problem of Hidden Variables in Quantum Mechanics , 1966 .
[12] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[13] V. L. Kurochkin,et al. Educational Potential of Quantum Cryptography and Its Experimental Modular Realization , 2017, 1710.08090.
[14] P. Townsend,et al. Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.
[15] Gisin,et al. Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[16] G. Roger,et al. Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .
[17] R. Hughes,et al. Quantum Cryptography , 1995, quant-ph/9504002.
[18] H. Chau,et al. Efficient Quantum Key Distribution , 1998, quant-ph/9803007.
[19] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.