Author:
Gottesman Daniel,Preskill John
Reference21 articles.
1. Bennett, C. H., and G. Brassard (1984), “Quantum cryptography: Public-key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India), pp. 175-179; C. H. Bennett and G. Brassard (1985), “Quantum public key distribution,” IBM Technical Disclosure Bulletin 28, 3153–3163.
2. Bennett, C. H., D. P. DiVincenzo, J. A. Smolin and W. K. Wootters (1996), “Mixed state entanglement and quantum error correction,” Phys. Rev. A 54, 3824–3851, quant-ph/9604024.
3. Biham, E., M. Boyer, P. O. Boykin, T. Mor and V. Roychowdhury (2000), “A proof of the security of quantum key distribution,” in Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp 715–724. New York: ACM Press, quant-ph/9912053.
4. Brassard, G., N. Lütkenhaus, T. Mor, and B. C. Sanders (2000), “Limitations on practical quantum cryptography,” Phys. Rev. Lett. 85, 1330, quant-ph/9911054.
5. Braunstein, S. (1998), “Error correction for continuous quantum variables,” Phys. Rev. Lett. 80, 4084, quant-ph/9711049.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献