共 20 条
[1]
BARNETT SM, 1997, METHODS THEORETICAL, P236
[2]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]
Generalized privacy amplification
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1995, 41 (06)
:1915-1923
[5]
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[6]
Limitations on practical quantum cryptography
[J].
PHYSICAL REVIEW LETTERS,
2000, 85 (06)
:1330-1333
[7]
Removal of a single photon by adaptive absorption -: art. no. 043814
[J].
PHYSICAL REVIEW A,
2001, 64 (04)
:438141-438146
[8]
Carmichael H., 1993, OPEN SYSTEMS APPROAC
[9]
FELIX S, QUANTPH0106086