Author:
Liu Yang,Zhao Qi,Li Ming-Han,Guan Jian-Yu,Zhang Yanbao,Bai Bing,Zhang Weijun,Liu Wen-Zhao,Wu Cheng,Yuan Xiao,Li Hao,Munro W. J.,Wang Zhen,You Lixing,Zhang Jun,Ma Xiongfeng,Fan Jingyun,Zhang Qiang,Pan Jian-Wei
Publisher
Springer Science and Business Media LLC
Reference32 articles.
1. Shannon, C. E. Communication theory of secrecy systems. Bell Labs Tech. J. 28, 656–715 (1949).
2. Metropolis, N. & Ulam, S. The Monte Carlo method. J. Am. Stat. Assoc. 44, 335–341 (1949).
3. Colbeck, R. Quantum and Relativistic Protocols for Secure Multi-party Computation. PhD thesis, Cambridge Univ. (2009).
4. Mayers, D. & Yao, A. Quantum cryptography with imperfect apparatus. In Proc. 39th Annual Symposium on Foundations of Computer Science (ed. Motwani, R.) 503–509 (IEEE, 1998).
5. Ma, X., Yuan, X., Cao, Z., Qi, B. & Zhang, Z. Quantum random number generation. npj Quantum Inf. 2, 16021 (2016).
Cited by
149 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献