相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Experimental demonstration of long-distance continuous-variable quantum key distribution
Paul Jouguet et al.
NATURE PHOTONICS (2013)
Security of Continuous-Variable Quantum Key Distribution Against General Attacks
Anthony Leverrier et al.
PHYSICAL REVIEW LETTERS (2013)
Analysis of imperfections in practical continuous-variable quantum key distribution
Paul Jouguet et al.
PHYSICAL REVIEW A (2012)
Field test of classical symmetric encryption with continuous variables quantum key distribution
Paul Jouguet et al.
OPTICS EXPRESS (2012)
Gaussian quantum information
Christian Weedbrook et al.
REVIEWS OF MODERN PHYSICS (2012)
A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution
Yue-Meng Chi et al.
NEW JOURNAL OF PHYSICS (2011)
Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources
Hong-Wei Li et al.
PHYSICAL REVIEW A (2011)
Device Calibration Impacts Security of Quantum Key Distribution
Nitin Jain et al.
PHYSICAL REVIEW LETTERS (2011)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Feihu Xu et al.
NEW JOURNAL OF PHYSICS (2010)
The security of practical quantum key distribution
Valerio Scarani et al.
REVIEWS OF MODERN PHYSICS (2009)
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system
Jerome Lodewyck et al.
PHYSICAL REVIEW LETTERS (2007)
Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution
Raul Garcia-Patron et al.
PHYSICAL REVIEW LETTERS (2006)
Optimality of Gaussian attacks in continuous-variable quantum cryptography
Miguel Navascues et al.
PHYSICAL REVIEW LETTERS (2006)
Trojan-horse attacks on quantum-key-distribution systems
N Gisin et al.
PHYSICAL REVIEW A (2006)
Continuous variable quantum cryptography using coherent states
F Grosshans et al.
PHYSICAL REVIEW LETTERS (2002)