A Simulative Comparison of BB84 Protocol with its Improved Version
暂无分享,去创建一个
[1] N. Gisin,et al. Quantum key distribution over 67 km with a plug , 2002 .
[2] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[3] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[4] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Samuel J. Lomonaco. A Talk on Quantum Cryptography or How Alice Outwits Eve , 2000 .
[7] Hoi-Kwong Lo. Will Quantum Cryptography ever become a successful technology in the marketplace , 1999 .
[8] Richard J. Hughes,et al. Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.
[9] I. V. Volovich,et al. On Classical and Quantum Cryptography , 2001, quant-ph/0108133.
[10] H. Chau,et al. Efficient Quantum Key Distribution , 1998, quant-ph/9803007.