Author:
Lai Hong,Pieprzyk Josef,Pan Lei,Li Ya
Funder
National Natural Science Foundation of China
Natural Science Foundation of Sichuan Province
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference56 articles.
1. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)
2. Bell, J.: On the Einstein–Podolsky–Rosen paradox. Physics 1, 195 (1964)
3. Bell, J.: On the problem of hidden variables in quantum mechanics. Rev. Modern Phys. 38, 447 (1966)
4. Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557–669 (1992)
5. Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceeding IEEE International Conferences on Computers, Systems and Signal Processing (Bangalore, India) (New York: IEEE) pp. 175-179 1984
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献