Author:
Pleshkov A. S.,Kolyako A. V.,Tret’yakov D. B.,Ryabtsev I. I.,Neizvestnyi I. G.
Reference22 articles.
1. W. K. Wootters and W. H. Zurek, ‘‘A single quantum cannot be cloned,’’ Nature 299, 802–803 (1982). https://doi.org/10.1038/299802a0
2. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, ‘‘Quantum cryptography,’’ Rev. Mod. Phys. 74, 145–195 (2002). https://doi.org/10.1103/revmodphys.74.145
3. C. H. Bennet, ‘‘Quantum cryptography: Public key distribution and coin tossing,’’ in Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, 1984), pp. 175–179.
4. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, ‘‘Experimental quantum cryptography,’’ J. Cryptology 5, 3–28 (1992). https://doi.org/10.1007/bf00191318
5. Ya. Liu, W.-J. Zhang, C. Jiang, J.-P. Chen, C. Zhang, W.-X. Pan, D. Ma, H. Dong, J.-M. Xiong, Ch.-J. Zhang, H. Li, R.-Ch. Wang, J. Wu, T.-Yu. Chen, L. You, X. Wang, Q. Zhang, and J.-W. Pan, ‘‘Experimental twin-field quantum key distribution over 1000 km fiber distance,’’ Phys. Rev. Lett. 130, 210801 (2023). https://doi.org/10.1103/physrevlett.130.210801