The braided single-stage protocol for quantum secure communication
暂无分享,去创建一个
[1] Partha Basuchowdhuri. Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol , 2007, ArXiv.
[2] William Perkins,et al. 1 S , 2006 .
[3] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[4] Edward Collett,et al. Polarized Light in Fiber Optics , 2003 .
[5] Subhash C. Kak. A Three-Stage Quantum Cryptography Protocol , 2005, ArXiv.
[6] Karl Svozil. The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks , 2005 .
[7] James Harold Thomas. Variations on Kak's Three Stage Quantum Cryptography Protocol , 2007, ArXiv.
[8] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[9] Guihua Zeng,et al. Quantum Private Communication , 2010 .
[10] Philippe Emplit,et al. Manipulating frequency entanglement with phase modulators , 2010 .
[11] Colin P. Williams. Explorations in Quantum Computing, Second Edition , 2011, Texts in Computer Science.
[12] Partha Basuchowdhuri. Classical Authentication Aided Three-Stage Quantum Protocol , 2006, ArXiv.