共 10 条
[1]
[Anonymous], 1985, IBM Technical Disclosure Bulletin, V28, P3153
[2]
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]
Bennett CH, 1996, PHYS REV A, V54, P3824, DOI 10.1103/PhysRevA.54.3824
[4]
BENOR M, UNPUB
[5]
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[8]
Mayers D., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P343
[9]
MAYERS D, IN PRESS J ASS COMPU
[10]
Multiple-particle interference and quantum error correction
[J].
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES,
1996, 452 (1954)
:2551-2577