Subject
General Physics and Astronomy,General Engineering,General Mathematics
Reference35 articles.
1. Information-theoretic limits to quantum cryptography
2. Bell's Inequality and Rejected-data Protocols for Quantum Cryptography
3. Eavesdropping Strategies and Rejected-data Protocols in Quantum Cryptography
4. Bekker H. & Piper F. 1982 Cipher systems: the protection of communications. London: Northwood Publications.
5. Bell J. S. 1987 Speakable and unspeakable in quantum mechanics. Cambridge University Press.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献