Research of hash-based secure key expansion algorithm for practical QKD
暂无分享,去创建一个
Hao Liang | Jian Wang | Hong-fei Zhang | Ge Jin | Lei Zhou | Teng-Yun Chen | Ke Cui | Sheng-zhao Lin | Chun-li Luo | Lei Zhou | Hao Liang | Jian Wang | Ke Cui | Hongfei Zhang | Chun-Li Luo | Sheng-zhao Lin | G. Jin | Teng-Yun Chen
[1] D. Lee,et al. Hash Function Vulnerability Index and Hash Chain Attacks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.
[2] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[3] Ueli Maurer. A Universal Statistical Test for Random Bit Generators , 1990, CRYPTO.
[4] Kai Chen,et al. Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.
[5] Kai Chen,et al. Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.
[6] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[7] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..