Quantum Key Distribution Protocols
暂无分享,去创建一个
[1] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[2] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[3] V. Scarani,et al. Security of two quantum cryptography protocols using the same four qubit states (18 pages) , 2005, quant-ph/0505035.
[4] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[5] Richard W. Hamming,et al. Coding and Information Theory , 1980 .
[6] Robert König,et al. The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.
[7] Norbert Lütkenhaus,et al. Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.
[8] R. Serfling. Probability Inequalities for the Sum in Sampling without Replacement , 1974 .
[9] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[10] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[11] Normand J. Beaudry. Assumptions in quantum cryptography , 2015, 1505.02792.
[12] I. Chuang,et al. Quantum Computation and Quantum Information: Bibliography , 2010 .
[13] A. Shimony,et al. Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .
[14] J. S. Shaari,et al. Advances in Quantum Cryptography , 2019, 1906.01645.
[15] B. S. Cirel'son. Quantum generalizations of Bell's inequality , 1980 .
[16] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[17] Anindya De,et al. Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..
[18] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[19] Robert König,et al. Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.
[20] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[21] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[22] Robert König,et al. Sampling of Min-Entropy Relative to Quantum Knowledge , 2007, IEEE Transactions on Information Theory.
[23] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[24] H. Chernoff. A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .
[25] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[26] Nicolas Gisin,et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.
[27] J. Bell. On the Einstein-Podolsky-Rosen paradox , 1964 .