The Physics of Quantum Information
暂无分享,去创建一个
[1] G. S. Vernam,et al. Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.
[2] W. Heisenberg. Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik , 1927 .
[3] N. Bohr. The Quantum Postulate and the Recent Development of Atomic Theory , 1928, Nature.
[4] Niels Bohr. Das Quantenpostulat und die neuere Entwicklung der Atomistik , 1928 .
[5] H. P. Robertson. The Uncertainty Principle , 1929 .
[6] L. Szilard. über die Entropieverminderung in einem thermodynamischen System bei Eingriffen intelligenter Wesen , 1929 .
[7] Albert Einstein,et al. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .
[8] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] J. von Neumann,et al. Probabilistic Logic and the Synthesis of Reliable Organisms from Unreliable Components , 1956 .
[11] I. Hirschman,et al. A Note on Entropy , 1957 .
[12] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[13] A. Holevo. Statistical decision theory for quantum systems , 1973 .
[14] Alexander Semenovich Holevo. Statistical problems in quantum physics , 1973 .
[15] I. Bialynicki-Birula,et al. Uncertainty relations for information entropy in wave mechanics , 1975 .
[16] W. Beckner. Inequalities in Fourier analysis , 1975 .
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Larry Carter,et al. Universal classes of hash functions (Extended Abstract) , 1977, STOC '77.
[19] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[20] Charles H. Bennett,et al. The thermodynamics of computation—a review , 1982 .
[21] D. Deutsch. Uncertainty in Quantum Measurements , 1983 .
[22] Wojciech H. Zurek,et al. Reversibility and stability of information processing systems , 1984 .
[23] Péter Gács,et al. Reliable computation with cellular automata , 1983, J. Comput. Syst. Sci..
[24] Rolf Landauer,et al. Computation and physics: Wheeler's meaning circuit? , 1986 .
[25] Kraus. Complementary observables and uncertainty relations. , 1987, Physical review. D, Particles and fields.
[26] Maassen,et al. Generalized entropic uncertainty relations. , 1988, Physical review letters.
[27] Rolf Landauer,et al. Dissipation and noise immunity in computation and communication , 1988, Nature.
[28] R. Landauer. Information is physical , 1991 .
[29] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[30] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[31] Charles H. Bennett,et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.
[32] William K. Wootters,et al. A ‘Pretty Good’ Measurement for Distinguishing Quantum States , 1994 .
[33] Shor,et al. Scheme for reducing decoherence in quantum computer memory. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[34] Andrew Chi-Chih Yao,et al. Security of quantum protocols against coherent measurements , 1995, STOC '95.
[35] Hall,et al. Information Exclusion Principle for Complementary Observables. , 1995, Physical review letters.
[36] R. Landauer. The physical nature of information , 1996 .
[37] Shor,et al. Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[38] Schumacher,et al. Quantum data processing and error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[39] Niels Bohr,et al. Discussion with Einstein on Epistemological Problems in Atomic Physics , 1996 .
[40] Charles H. Bennett,et al. Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[41] Schumacher,et al. Sending entanglement through noisy quantum channels. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[42] Steane,et al. Error Correcting Codes in Quantum Theory. , 1996, Physical review letters.
[43] A. Kitaev. Quantum computations: algorithms and error correction , 1997 .
[44] E. Knill,et al. Theory of quantum error-correcting codes , 1997 .
[45] Dorit Aharonov,et al. Fault-tolerant quantum computation with constant error , 1997, STOC '97.
[46] S. Lloyd. Capacity of the noisy quantum channel , 1996, quant-ph/9604015.
[47] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[48] M. Nielsen,et al. Information transmission through a noisy quantum channel , 1997, quant-ph/9702049.
[49] Alexander S. Holevo,et al. The Capacity of the Quantum Channel with General Signal States , 1996, IEEE Trans. Inf. Theory.
[50] P. Shor,et al. QUANTUM-CHANNEL CAPACITY OF VERY NOISY CHANNELS , 1997, quant-ph/9706061.
[51] Lo,et al. Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.
[52] Andreas J. Winter,et al. Coding theorem and strong converse for quantum channels , 1999, IEEE Trans. Inf. Theory.
[53] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[54] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.
[55] R. Landauer,et al. Irreversibility and heat generation in the computing process , 1961, IBM J. Res. Dev..
[56] David P. DiVincenzo,et al. Quantum information and computation , 2000, Nature.
[57] P. Oscar Boykin,et al. A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.
[58] Dominic Mayers,et al. Unconditional security in quantum cryptography , 1998, JACM.
[59] Hoi-Kwong Lo,et al. Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..
[60] Luca Trevisan,et al. Extractors and pseudorandom generators , 2001, JACM.
[61] Hans Aschauer,et al. Security proof of quantum cryptography based entirely on entanglement purification , 2001, quant-ph/0111066.
[62] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.