Author:
Tan Si-Hui,Kettlewell Joshua A.,Ouyang Yingkai,Chen Lin,Fitzsimons Joseph F.
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM journal on computing 26, 1484–1509 (1997).
2. Grover, L. K. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, STOC ‘96, 212–219 (1996).
3. Lloyd, S. et al. Universal quantum simulators. Science 273, 5278, 1073–1077 (1996).
4. Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and signal processing vol. 175, 8 (1984).
5. Ekert, A. K. Quantum cryptography based on bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991).
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献