[1] Liu Yang. The experimental study of long range Quantum key distribution system(远距离量子密钥分发系统的相关研究)[D][博士论文]. Hefei: University of Science and Technology of China, 2012:11-12. [2] Yin Hualei, Chen Tengyun, Yu Zongwen, et al. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber [J]. Phys. Rev. Lett, 2016, 117(19):190501. [3] Liao Shengkai, Cai Wenqi, Handsteiner Johannes, et al. Satellite-Relayed Intercontinental Quantum Network [J]. Phys. Rev. Lett, 2018, 120(3):030501. [4] Fung C.H.F., Ma Xiongfeng, Chau H.F.. Practical issues in quantum-key-distribution post processing [J]. Physical Review A 2010, 81(1):012318 [5] Yang Xiuqing. The Security of Practical Quantum Key Distribution Systems(实际量子密钥分发系统的安全性研究)[D][博士论文]. Beijing Jiaotong University, 2018:9-21. [6] Zhou Chun. Research on Security of Decoy-State Quantum key distribution with Finite Resources(有限长量子密钥分配安全性研究)[D][博士论文]. Zhengzhou: PLA Information Engineering University, 2014:44-51. [7] Chen Yitian, Liu Hongwei, Qu Wenxiu, et al. Software control in quantum key distribution system(量子密钥分发系统软件控制研究)[J]. Chinese Journal of Quantum Electronics(量子电子学报),2018,35(6):682-689(in Chinese). [8] Wang Chaoze, Liu Weiyue, Cao Lei, et al. High-speed pulse modulation based on FPGA(基于PFGA的高速脉冲调制)[J], Chinese Journal of Quantum Electronics(量子电子学报),2018,33(2):188-192(in Chinese). [9] Lo H.K., Ma X., Chen K. Decoy state quantum key distribution [J]. Physical Review Letters, 2005, 94(23):230504. [10] Wang Xiangbin. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters, 2005, 94(23):230503. [11] Tang Yanlin. Experimental study of security in practical quantum key distribution system(实际量子密钥分发系统安全性的实验研究)[D][博士论文]. Hefei: University of Science and Technology of China, 2015:21-22. [12] Krawczyk Hugo. LFSR-based hashing and authentication [J]. Advances in Cryptology-crypto 94, International Cryptology Conference, Santa Barbara, California, USA, August, 1994, (839):129-139. |