[1]
|
Gisin, N., et al. (2002) Quantum Cryptography. Reviews of Modern Physics, 74, 145. http://dx.doi.org/10.1103/RevModPhys.74.145
|
[2]
|
Scarani, V., et al. (2009) The Security of Practical Quantum Key Distribution. Reviews of Modern Physics, 81, 1301. http://dx.doi.org/10.1103/RevModPhys.81.1301
|
[3]
|
Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public-Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 175-179.
|
[4]
|
Bennett, C.H. and Brassard, G. (1985) Quantum Public Key Distribution. IBM Technical Disclosure Bulletin, 28, 3153-3163.
|
[5]
|
Vernam, G.S. (1926) Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Transactions of the American Institute of Electrical Engineers, 45, 295-301.
|
[6]
|
Shor, P.W. and Preskill, J. (2000) Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85, 441-444. http://dx.doi.org/10.1103/PhysRevLett.85.441
|
[7]
|
Fung, C.-H.F., et al. (2007) Phase-Remapping Attack in Practical Quantum-Key-Distribution Systems. Physical Review A, 75, Article ID: 032314. http://dx.doi.org/10.1103/PhysRevA.75.032314
|
[8]
|
Xu, F., Qi, B. and Lo, H.-K. (2010) Experimental Demonstration of Phase-Remapping Attack in a Practical Quantum Key Distribution System. New Journal of Physics, 12, Article ID: 113026. http://dx.doi.org/10.1088/1367-2630/12/11/113026
|
[9]
|
Qi, B., et al. (2007) Time-Shift Attack in Practical Quantum Cryptosystems. Quantum Information Computation, 7, 73-82.
|
[10]
|
Zhao, Y., et al. (2008) Quantum Hacking: Experimental Demonstration of Time-Shift Attack against Practical Quantum-Key-Distribution Systems. Physical Review A, 78, Article ID: 042333. http://dx.doi.org/10.1103/PhysRevA.78.042333
|
[11]
|
Lydersen, L., et al. (2010) Hacking Commercial Quantum Cryptography Systems by Tailored Bright Illumination. Nature Photonics, 4, 686-689. http://dx.doi.org/10.1038/nphoton.2010.214
|
[12]
|
Gerhardt, I., et al. (2011) Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System. Nature Communications, 2, 349. http://dx.doi.org/10.1038/ncomms1348
|
[13]
|
Shaari, J.S., Lucamarini, M. and Wahiddin, M.R.B. (2006) Deterministic Six States Protocol for Quantum Communication. Physics Letters A, 358, 85-90. http://dx.doi.org/10.1016/j.physleta.2006.05.007
|
[14]
|
Deng, F.-G. and Long, G.L. (2003) Controlled Order Rearrangement Encryption for Quantum Key Distribution. Physical Review A, 68, Article ID: 042315. http://dx.doi.org/10.1103/PhysRevA.68.042315
|