共 50 条
- [42] Simulation of BB84 Quantum Key Exchange Protocol and Attack Analysis 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 203 - 207
- [44] Randomness determines practical security of BB84 quantum key distribution Scientific Reports, 5
- [45] An improved scheme that the random matrix transformation used for BB84 protocol INTERNATIONAL CONFERENCE ON PHOTONICS AND OPTICAL ENGINEERING (ICPOE 2014), 2015, 9449
- [47] Man-in-the-middle Attack on BB84 Protocol and its Defence 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
- [49] Optimizing the decoy-state BB84 QKD protocol parameters Quantum Information Processing, 2021, 20
- [50] The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1571 - 1574