Quantum cryptography without public announcement of bases
暂无分享,去创建一个
[1] Yeshaiahu Fainman,et al. Security of quantum cryptography against individual attacks , 1998, Other Conferences.
[2] N. Gisin,et al. OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .
[3] Nicolas Gisin,et al. Quantum cloning, eavesdropping and Bell's inequality , 1997 .
[4] J. Cirac,et al. Coherent eavesdropping strategies for the four state quantum cryptography protocol , 1997, quant-ph/9702002.
[5] E. Biham,et al. Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.
[6] Gisin,et al. Unambiguous quantum measurement of nonorthogonal states. , 1996, Physical review. A, Atomic, molecular, and optical physics.
[7] E. Biham,et al. Bounds on Information and the Security of Quantum Cryptography , 1996, quant-ph/9605010.
[8] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[9] M. Ardehali. Quantum cryptography based on wheeler's delayed choice experiment , 1995, quant-ph/9508008.
[10] Artur Ekert,et al. Information Gain in Quantum Eavesdropping , 1994 .
[11] Vladimir B. Braginsky,et al. Quantum Measurement , 1992 .
[12] Artur Ekert. Beating the code breakers , 1992, Nature.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] Charles H. Bennett,et al. Quantum cryptography without Bell's theorem. , 1992, Physical review letters.
[15] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[16] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[17] Franco Selleri,et al. Quantum mechanics versus local realism : the Einstein-Podolsky-Rosen paradox , 1988 .
[18] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[19] B. D'espagnat. Conceptual Foundations Of Quantum Mechanics , 1971 .