A Comprehensive Survey on : Quantum Cryptography
暂无分享,去创建一个
[1] B. Sangeetha,et al. A Survey on Recent Security Trends using Quantum Cryptography , 2010 .
[2] A. K. Singh,et al. Quantum Key Distribution Protocols: A Review , 2014 .
[3] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[4] Yu-Fang Chung,et al. Unconditionally secure cryptosystems based on quantum cryptography , 2008, Inf. Sci..
[5] Won-Young Hwang. Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.
[6] Christine Chen,et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.
[7] Eduin H. Serna. Quantum Key Distribution From A Random Seed , 2013, 1311.1582.
[8] Hoi-Kwong Lo,et al. A Survey on Quantum Cryptographic Protocols and Their Security , 2007, Canadian Conference on Electrical and Computer Engineering.
[9] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[10] M. Redhead. Quantum theory and measurement , 1984 .
[11] Charles H. Bennett,et al. WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .
[12] Mostafa Azizi,et al. Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.
[13] J. Skaar,et al. After-gate attack on a quantum cryptosystem , 2010, 1009.2683.
[14] Sanders,et al. Limitations on practical quantum cryptography , 2000, Physical review letters.
[15] Jaydip Sen. Theory And Practice Of Cryptography And Network Security Protocols And Technologies , 2014 .
[16] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.