Author:
Fan-Yuan Guan-Jie,Chen Wei,Lu Feng-Yu,Yin Zhen-Qiang,Wang Shuang,Guo Guang-Can,Han Zheng-Fu
Publisher
Springer Science and Business Media LLC
Reference54 articles.
1. Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of Conference on Computers, Systems and Signal Processing, Bangalore, 175
2. Ekert A K. Quantum cryptography based on Bell’s theorem. Phys Rev Lett, 1991, 67: 661–663
3. Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices. In: Proceedings of International Symposium on Information Theory, Chicago, 2004. 136
4. Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution. Rev Mod Phys, 2009, 81: 1301–1350
5. Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett, 2005, 94: 230503
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献