Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)
暂无分享,去创建一个
H. Rezig | Ridha Bouallegue | Ammar Bouallegue | Olfa Trabelsi | Iyed Ben Slimen | Iyed Ben Slimen | A. Bouallègue | H. Rezig | O. Trabelsi | R. Bouallègue
[1] T. Moon. Error Correction Coding: Mathematical Methods and Algorithms , 2005 .
[2] N. Gisin,et al. Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.
[3] Wolfgang Tittel,et al. Practical Aspects of Quantum Cryptographic Key Distribution , 2000, Journal of Cryptology.
[4] I. Chuang,et al. Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .
[5] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[6] Renato Renner,et al. Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.
[7] Hoi-Kwong Lo,et al. Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.
[8] V. Scarani,et al. Security of two quantum cryptography protocols using the same four qubit states (18 pages) , 2005, quant-ph/0505035.