Application framework for high security requirements in R&D environments based on quantum cryptography
暂无分享,去创建一个
[1] Artur Ekert,et al. Information Gain in Quantum Eavesdropping , 1994 .
[2] A. Zeilinger,et al. Practical quantum key distribution with polarization entangled photons , 2005 .
[3] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[4] N. Imoto,et al. Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.
[5] N. Gisin,et al. Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .
[6] H. Weinfurter,et al. Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.
[7] N. Lütkenhaus. Security against individual attacks for realistic quantum key distribution , 2000 .
[8] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[9] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[10] H. Weinfurter,et al. Entanglement-based quantum communication over 144km , 2007 .
[11] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[12] D. Bruß. Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.