Entangled-photon six-state quantum cryptography
暂无分享,去创建一个
[1] B. Krauskopf,et al. Proc of SPIE , 2003 .
[2] Anders Karlsson,et al. Security of quantum key distribution using d-level systems. , 2001, Physical review letters.
[3] Edo Waks,et al. Security of quantum key distribution with entangled photons against individual attacks , 2000, quant-ph/0012078.
[4] N. Gisin,et al. Experimental entanglement distillation and ‘hidden’ non-locality , 2001, Nature.
[5] A. G. White,et al. Experimental verification of decoherence-free subspaces. , 2000, Science.
[6] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[7] Weinfurter,et al. Quantum cryptography with entangled photons , 1999, Physical review letters.
[8] White,et al. Entangled state quantum cryptography: eavesdropping on the ekert protocol , 1999, Physical review letters.
[9] Gisin,et al. Quantum cryptography using entangled photons in energy-time bell states , 1999, Physical review letters.
[10] Dagmar Bruß,et al. Quantum Key Distribution: from Principles to Practicalities , 1999, Applicable Algebra in Engineering, Communication and Computing.
[11] Bahaa E. A. Saleh,et al. Quantum cryptography using femtosecond-pulsed parametric down-conversion , 1999 .
[12] Norbert Lütkenhaus,et al. ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .
[13] S. Wolf,et al. Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.
[14] H. Bechmann-Pasquinucci,et al. Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.
[15] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[16] Yeshaiahu Fainman,et al. Evaluation of the cost of error-correction protocol in quantum cryptographic transmission , 1998, Other Conferences.
[17] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[18] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[19] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[20] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[21] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.