Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes
暂无分享,去创建一个
[1] J. Neumann. Mathematical Foundations of Quantum Mechanics , 1955 .
[2] Frank Gaitan. Quantum Error Correction and Fault Tolerant Quantum Computing , 2008 .
[3] Sunghwan Kim,et al. Construction and complement circuit of a quantum stabilizer code with length 7 , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).
[4] Daniel Gottesman,et al. Stabilizer Codes and Quantum Error Correction , 1997, quant-ph/9705052.
[5] Fibirova Jana,et al. Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .
[6] Sunghwan Kim,et al. Quantum stabilizer codes construction from Hermitian self-orthogonal codes over GF(4) , 2018, Journal of Communications and Networks.
[7] Lov K. Grover. Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.
[8] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[9] Sunghwan Kim,et al. Quantum Key Distribution Protocol Based on Modified Generalization of Deutsch-Jozsa Algorithm in d-level Quantum System , 2018, International Journal of Theoretical Physics.
[10] Shor,et al. Scheme for reducing decoherence in quantum computer memory. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[11] Steane,et al. Error Correcting Codes in Quantum Theory. , 1996, Physical review letters.
[12] Abhishek Parakh,et al. Correcting rotational errors in three stage QKD , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[13] Qing-yu Cai,et al. The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.
[14] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[15] Subhash C. Kak. A Three-Stage Quantum Cryptography Protocol , 2005, ArXiv.
[16] Pramode K. Verma,et al. Multi-photon quantum key distribution based on double-lock encryption , 2015, 2015 Conference on Lasers and Electro-Optics (CLEO).
[17] Pramode K. Verma,et al. Multi-photon implementation of three-stage quantum cryptography protocol , 2013, The International Conference on Information Networking 2013 (ICOIN).
[18] R. Feynman. Simulating physics with computers , 1999 .
[19] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[20] Sunghwan Kim,et al. Minimal-Entanglement Entanglement-Assisted Quantum Error Correction Codes from Modified Circulant Matrices , 2017, Symmetry.
[21] Mustafa Riza,et al. A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm , 2015 .
[22] Anirban Pathak,et al. Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol , 2018, Quantum Information Processing.
[23] W. Munro,et al. Quantum error correction for beginners , 2009, Reports on progress in physics. Physical Society.