Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference43 articles.
1. Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Reviews of Modern Physics, 2002, 74(1): 145-195. https://doi.org/10.1103/RevModPhys.74.145.
2. Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In Proc. IEEE International Conference on Computers, Systems & Signal Processing, December 1984, pp.175-179.
3. Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M, Perrenoud M, Gras G, Bussieres F, Li M J, Nolan D, Martin A, Zbinden H. Secure quantum key distribution over 421 km of optical fiber. Physical Review Letters, 2018, 121(19): Article No. 190502. https://doi.org/10.1103/Phys-RevLett.121.190502.
4. Cao W F, Zhen Y Z, Zheng Y L, Li L, Chen Z B, Liu N L, Chen K. One-sided measurement-device-independent quantum key distribution. Physical Review A, 2018, 97(1): Article No. 012313. https://doi.org/10.1103/physreva.97.012313.
5. Dellantonio L, Sorensen A S, Bacco D. High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces. Physical Review A, 2018, 98(6): Article No. 062301. https://doi.org/10.1103/Phys-RevA.98.062301.