[1]Wiesner S.Conjugate coding[J].ACM Sigact News, 1983, 15(1):78-88
[2]Bennett CH, Brassard G.Quantum cryptography: Public key distribution and coin tossing[J].Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984, 175(150):8-
[3]Bennett, Charles H.Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters, 1992, 68(21):3121-3124
[4]Tamaki K, Lütkenhaus N.Unconditional security of the Bennett 1992 quantum key-distribution over lossy and noisy channel[J].arXiv preprint quant-ph/0308048, 2003, :-
[5]Aggarwal R, Sharma H, Gupta D.Analysis of Various Attacks over BB84 Quantum Key Distribution Protocol[J].International Journal of Computer Applications, 2011, 20:-
[6]Dehmani M, Ez-Zahraouy H, Benyoussef A.Quantum Cryptography with Several Cloning Attacks[J].Journal of Computer Science, 2010, 6(7):684-688
[7]Pereszlenyi A.Simulation of quantum key distribution with noisy channels [C].Telecommunications, 2005 ConTEL 2005 Proceedings of the 8th International Conference on; 2005 June 15-17, 2005; 2005. p. 203-10..8th International Conference on Telecommunications, 2005, 1:203-210
[8]Eastin, B.and S. T. Flammia (2004). "Q-circuit tutorial [J]." arXiv preprint quant-ph/0406003. |