Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack
暂无分享,去创建一个
[1] D. Vernon. Inform , 1995, Encyclopedia of the UN Sustainable Development Goals.
[2] A. Isar,et al. ABOUT QUANTUM-SYSTEMS , 2004 .
[3] Zach DeVito,et al. Opt , 2017 .
[4] R. B. Saptsov,et al. ∫ Erratum: "On the Relaxation of the Order Parameter in the BCS Model," Pis'ma Zh. Éksp. Teor. Fiz. 83, 414 (2006) (JETP Lett. 83, 355 (2006)) , 2007 .
[5] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .
[6] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[7] Alexander Semenovich Holevo,et al. Quantum Systems, Channels, Information: A Mathematical Introduction , 2019 .
[8] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[9] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[10] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[11] Andrew G. Glen,et al. APPL , 2001 .