Author:
Levin G. G.,Lyaskovskiy V. L.,Samoilenko A. A.,Min’kov K. N.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Instrumentation
Reference11 articles.
1. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Modern Phys., 74, 145–195 (2002), DOI: https://doi.org/10.1103/revmodphys.74.145.
2. Quantum Safe Cryptography and Security. An introduction, Benefits, Enablers and Challenges, ETSI White Paper No. 8, https://www.etsi.org/images/files/ETSI WhitePapers/QuantumSafeWhitepaper.pdf, acc. 08.13.2019.
3. T. D. Ladd, F. Jelezko, R. Laflamme, et al., “Quantum computers,” Nature, 464, 45–53 (2010), DOI: https://doi.org/10.1038/nature08812.
4. N. Sangouard, C. Simon, H. D. Riedmatten, and N. Gisin, “Quantum repeaters based on atomic ensembles and linear optics,” Rev. Mod. Phys., No. 83, 33–80 (2011), DOI: https://doi.org/10.1103/RevModPhys.83.33.
5. A. Lvovsky, B. Sanders, and W. Tittel, “Optical quantum memory,” Nat. Photon, No. 3, 706–714 (2009), DOI: https://doi.org/10.1038/nphoton.2009.231.