|
1. H.Barnum, C.Crepeau, D.Gottesman, A.Smith and A.Tapp,” Authentication of Quantum Messages,” CoRR quant-ph/0205128 , 2002.
2. C.Barnum ,D.Gottesman and A.Smith, “Authentication of Quantum Messages,”In Proceedings of 43rd Annual IEEE Symposium on the Foundations of Computer Science, Vancouver, pp. 449-458, 2002.
3. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, "Experimental Quantum Cryptography," Journal of Cryptology, vol.5, no.1, pp.3-2,1992.
4. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing” Pro. IEEE Conf. on computers, Systems and signal processing (Bangalore, India) (Piscataway, NJ: IEEE), pp.175-179, 1984.
5. C. H. Bennett and G. Brassard, Proc. IEEE Int. “Conference on Computer’s Systems and Signal Processing”, IEEE, New York, pp.175-179, 1984.
6. Biham, E. and T. Mor, “Bounds on Information and the Security of Quantum Cryptography,”Phys. Rev. Lett.79, pp.4034-4037, 1997.
7. Biham, E. and T. Mor, “Security of quantum cryptography against collective attacks,”Phys. Rev. Lett.78, pp.2256-2259, 1997.
8. Goong Chen, Ranee K. Brylinski. ,”Mathematics of quantum computation”,Boca Raton : CRC Press, 2002.
9. W.Diffie and M. E.Hellman,“New Directions in Cryptography,”IEEE Trans. on Information Theory, Vol.22, No.11,pp644-654, 1976.
10. A. Einstein and B. Podolsky and N. Rosen “Can quantum-Mechanical description of Physical Reality be considered complete”, Phys. Rev. 47, 777–780, 1935.
11. H. -K. Lo and H. F. Chau, "Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances," Science, vol. 283, pp.2050-2056, 1999.
12. Michael A. Nielsen and L. Isaac, “Chuang Quantum Computation and Quantum Information.” Cambridge, 2000
13. P.W. Shor and J. Preskill. “Simple Proof of Security of the BB84 Quantum Key Distribution Protocol.” Phys. Rev. Lett. 85, 441-444, 2000.
14. N. Zhou, G. Zeng and J. Xiong,”Quantum key agreement rotocol”,ELECTRONICS LETTERS 2nd Vol. 40 No.18 , pp.1149-1150, 2004.
15. 真野正 , 資料結構:使用C語言 教學範本 , 博碩, 2003.
16. 量子資訊教材 http://nsc.cs.nthu.edu.tw/QIS/index.htm 17. 賴溪松、韓亮、張真誠 , 近代密碼學及其應用(第三版) .旗標出版社, 2002..
|