Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Hughes, R., Nordholt, J.: Refining Quantum Cryptography. Science (80) 333(6049), 1584–1586 (2011). https://doi.org/10.1126/science.1208527
2. Lidbjörk, E., Söderström Nylander, R.: Cost and Efficiency Comparison of Quantum Key Distribution Schemes. KTH Royal Institute of Technology, Stockholm (2023)
3. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (1984)
4. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991). https://doi.org/10.1103/PhysRevLett.67.661
5. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992). https://doi.org/10.1103/PhysRevLett.68.3121
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献