Author:
Jin Xiao-Hang,Yin Zhen-Qiang,Wang Shuang,Chen Wei,Guo Guang-Can,Han Zheng-Fu
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Prospect and Key Core Technology Projects of Jiangsu provincial key R & D Program
Fundamental Research Funds for the Central Universities
Innovation Program for Quantum Science and Technology
Publisher
Springer Science and Business Media LLC
Reference37 articles.
1. Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. IEEE New York (1984)
2. Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050–2056 (1999)
3. Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
4. Dunworth, D.B.C., Lipton, R.J.: Breaking des using a molecular computer. DNA Based Comput. 27, 37 (1996)
5. Wang, X., Yu, H.: How to break md5 and other hash functions. In: Cramer, R. (ed.) ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS. Lecture Notes in Computer Science, vol. 3494, pp. 19-35 (2005). Int Assoc Cryptol Res