相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Random numbers certified by Bell's theorem
S. Pironio et al.
NATURE (2010)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Feihu Xu et al.
NEW JOURNAL OF PHYSICS (2010)
Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier
Nicolas Gisin et al.
PHYSICAL REVIEW LETTERS (2010)
Closing the Detection Loophole in Bell Experiments Using Qudits
Tamas Vertesi et al.
PHYSICAL REVIEW LETTERS (2010)
CONVERGENT RELAXATIONS OF POLYNOMIAL OPTIMIZATION PROBLEMS WITH NONCOMMUTING VARIABLES
S. Pironio et al.
SIAM JOURNAL ON OPTIMIZATION (2010)
Device-independent quantum key distribution secure against collective attacks
Stefano Pironio et al.
NEW JOURNAL OF PHYSICS (2009)
Universally Composable Privacy Amplification from Causality Constraints
Lluis Masanes
PHYSICAL REVIEW LETTERS (2009)
Device-independent security of quantum cryptography against collective attacks
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2007)
Bounding the set of quantum correlations
Miguel Navascues et al.
PHYSICAL REVIEW LETTERS (2007)
From Bell's theorem to secure quantum key distribution
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2006)
Efficient quantum key distribution secure against no-signalling eavesdroppers
Antonio Acin et al.
NEW JOURNAL OF PHYSICS (2006)
No signaling and quantum key distribution
J Barrett et al.
PHYSICAL REVIEW LETTERS (2005)
Bell inequalities for arbitrarily high-dimensional systems
D Collins et al.
PHYSICAL REVIEW LETTERS (2002)