共 50 条
- [41] On the optimality of individual entangling-probe attacks against BB84 quantum key distribution The European Physical Journal D, 2008, 46 : 395 - 406
- [42] Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks 2011 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2011,
- [43] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16
- [46] Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses -: art. no. 062301 PHYSICAL REVIEW A, 2005, 71 (06):
- [47] Quantum key distribution for d-level systems with generalized Bell states -: art. no. 052331 PHYSICAL REVIEW A, 2002, 65 (05): : 7
- [49] Comment on "Quantum key distribution for d-level systems with generalized Bell states" -: art. no. 066301 PHYSICAL REVIEW A, 2005, 72 (06):
- [50] Quantum key distribution between N partners:: Optimal eavesdropping and Bell's inequalities -: art. no. 012311 PHYSICAL REVIEW A, 2002, 65 (01): : 8