Ensuring Security & Trust in a Post-Quantum Environment
暂无分享,去创建一个
[1] G. Roger,et al. Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .
[2] Walter Fumy. Quantencomputer und die Zukunft der Kryptographie , 2017, Datenschutz und Datensicherheit - DuD.
[3] J. Bell. On the Einstein-Podolsky-Rosen paradox , 1964 .
[4] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[5] Rupert Ursin,et al. An entanglement-based wavelength-multiplexed quantum communication network , 2018, Nature.
[6] Qiang Zhang,et al. Large scale quantum key distribution: challenges and solutions [Invited]. , 2018, Optics express.
[7] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[8] H. Weinfurter,et al. Entanglement-based quantum communication over 144km , 2007 .
[9] Fang Song,et al. Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks , 2017, CRYPTO.
[10] John Bell. Bell (1964): on the Einstein Podolsky Rosen Paradox [edit-1] , 2019 .