Author:
Li Dan,Yang Yu-Guang,Bi Jing-Lin,Yuan Jia-Bin,Xu Juan
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Bennett, C. H., Brassard, G., Crépeau, C. & Maurer, U. M. Generalized privacy amplification. IEEE Trans. Inf. Theory 41, 1915–1923 (1995).
2. Li, D., et al. Discrete-time interacting quantum walks and quantum hash schemes. Quant. Inf. Proc. 3, 1501–1513 (2013).
3. Li, D., Zhang, J., Ma, X. W., Zhang, W. W. & Wen, Q. Y. Analysis of the two-particle controlled interacting quantum walks. Quant. Inf. Proc. 6, 2167–2176 (2013).
4. Yang, Y. G., Xu, P., Yang, R., Zhou, Y. H. & Shi, W. M. Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6, 19788 (2016).
5. Elas, S. & Andraca, V. Quantum walks: a comprehensive review. Quant. Inf. Proc. 11, 1015–1106 (2012).
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献