Author:
Gisin Nicolas,Wolf Stefan
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. H. Bechmann-Pasquinucci and N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Phys. Rev. A, Vol. 59, No. 6, pp. 4238–4248, 1999.
2. C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, and W. K. Wooters, Purification of noisy entanglement and faithful teleportation via noisy channels, Phys. Rev. Lett., Vol. 76, pp. 722–725, 1996.
3. C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computer, Systems, and Signal Processing, IEEE, pp. 175–179, 1984.
4. D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., Vol. 81, No. 14, pp. 3018–3021, 1998.
5. V. Bužek and M. Hillery, Quantum copying: beyond the no-cloning theorem, Phys. Rev. A, Vol. 54, pp. 1844–1852, 1996.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献