|
[1] 李建興. "圖靈耗費2年心力,但雲端加AI只用15分鐘,就破解了納粹Enigma密碼機" iThome新聞2017-12-04 [2] Shor, Peter W. "Algorithms for quantum computation: Discrete logarithms and factoring." Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. Ieee, 1994. [3] Hughes, Richard J. "Cryptography, quantum computation and trapped ions." PHILOSOPHICAL TRANSACTIONS-ROYAL SOCIETY OF LONDON SERIES A MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES (1998): 1853-1868. [4] Liu, Chang, et al. "Differential-phase-shift quantum key distribution using heralded narrow-band single photons." Optics express 21.8 (2013): 9505-9513. [5] Inoue, K., E. Waks, and Y. Yamamoto. "Differential-phase-shift quantum key distribution using coherent light." Physical Review A 68.2 (2003): 022317. [6] James, Ioan. "Claude Elwood Shannon. 30 April 1916—24 February 2001." (2009): rsbm20090015. [7] Shannon, Claude E. "Communication theory of secrecy systems." Bell system technical journal 28.4 (1949): 656-715. [8] Diffie, Whitfield, and Martin Hellman. "New directions in cryptography." IEEE transactions on Information Theory 22.6 (1976): 644-654. [9] Rivest, Ronald L., Adi Shamir, and Leonard M. Adleman. "Cryptographic communications system and method." U.S. Patent No. 4,405,829. 20 Sep. 1983. [10] Wootters, William K., and Wojciech H. Zurek. "A single quantum cannot be cloned." Nature 299.5886 (1982): 802-803. [11] Bennett, Charles H., and Gilles Brassard. "Quantum cryptography: Public key distribution and coin tossing." Theor. Comput. Sci. 560.P1 (2014): 7-11. [12] Fox, Mark. Quantum optics: an introduction. Vol. 15. OUP Oxford, 2006. [13] Steane, Andrew M. "Error correcting codes in quantum theory." Physical Review Letters 77.5 (1996): 793. [14] Deutsch, David, et al. "Quantum privacy amplification and the security of quantum cryptography over noisy channels." Physical review letters 77.13 (1996): 2818. [15] Diamanti, Eleni. Security and implementation of differential phase shift quantum key distribution systems. Stanford University, 2006. [16] Shannon, Claude Elwood. "A mathematical theory of communication." ACM SIGMOBILE mobile computing and communications review 5.1 (2001): 3-55. [17] Bennett, Charles H. "Quantum cryptography using any two nonorthogonal states." Physical review letters 68.21 (1992): 3121. [18] Inoue, Kyo, Edo Waks, and Yoshihisa Yamamoto. "Differential phase shift quantum key distribution." Physical Review Letters 89.3 (2002): 037902. [19] Hui, Yan, Zhu Shi-Liang, and Du Sheng-Wang. "Efficient phase-encoding quantum key generation with narrow-band single photons." Chinese Physics Letters 28.7 (2011): 070307. [20] Yasuhiro Tokura and Toshimori Honjo. "Differential Phase Shift Quantum Key Distribution (DPS-QKD) Experiments." NTT Technical Review [21] Honjo, T., K. Inoue, and H. Takahashi. "Differential-phase-shift quantum key distribution experiment with a planar light-wave circuit Mach–Zehnder interferometer." Optics letters 29.23 (2004): 2797-2799. [22] Inoue, Kyo. "Differential phase-shift quantum key distribution systems." IEEE Journal of Selected Topics in Quantum Electronics 21.3 (2015): 109-115. [23] Wen, Kai, Kiyoshi Tamaki, and Yoshihisa Yamamoto. "Unconditional security of single-photon differential phase shift quantum key distribution." Physical review letters 103.17 (2009): 170503. [24] Honjo, T., T. Inoue, and K. Inoue. "Influence of light source linewidth in differential-phase-shift quantum key distribution systems." Optics Communications 284.24 (2011): 5856-5859. [25] Chuu, Chih-Sung, G. Y. Yin, and S. E. Harris. "A miniature ultrabright source of temporally long, narrowband biphotons." Applied Physics Letters 101.5 (2012): 051108.
|