Научная литература
booksshare.net -> Добавить материал -> Физика -> Бауместер Д. -> "Физика квантовой информации" -> 139

Физика квантовой информации - Бауместер Д.

Бауместер Д., Экерт А., Цайлингер А. Физика квантовой информации — М.: Постмаркет, 2002. — 376 c.
ISBN 5-94057-017-8
Скачать (прямая ссылка): fizikakvantovoyinformacii2002.pdf
Предыдущая << 1 .. 133 134 135 136 137 138 < 139 > 140 141 142 143 144 145 .. 151 >> Следующая

23. J.S. Bell, On the Einstein-Podolsky-Rosen paradox, Physics 1, 195 (1964), reprinted in J.S. Bell, Speakable and Unspeakable in Quantum Mechanics, Cambridge U.P., Cambridge (1987).
24. S.J. Freedman and J.S. Clauser, Phys. Rev. Lett. 28, 938 (1972); A. Aspect, J. Dalibard, and G. Roger, Phys. Rev. Lett. 47, 1804 (1982); W. Tit-tel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 81, 3563 (1998); G. Weihs, T. Jennewein, C. Simon, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 81, 5039 (1998).
25. A. Aspect, P. Grangier, and G. Roger, Phys. Rev. Lett. 47, 460 (1981); 49, 91 (1982); A. Aspect, J. Dalibard, and G. Roger, ibid. 49, 1804 (1982).
26. P.G. Kwiat, K. Mattie, H. Weinfurter, A. Zeilinger, A.V. Sergienko, and Y.H. Shih, Phys. Rev. Lett. 75, 4337 (1995).
27. P.M. Pearle, Phys. Rev. D 2, 1418 (1970); J.F. Clauser, A. Shimony, Rep. Prog. Phys. 41, 1881 (1978).
28. E.P. Wigner, Am. J. Phys. 38, 1005 (1970).
29. D. Kahn, The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).
30. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press (1996).
31. B. Schneier, Applied cryptography: protocols, algorithms, and source code in
C, John Wiley & Sons (1994).
32. D. Welsh, Codes and Cryptography, Clarendon Press, Oxford, (1988).
33. C.E. Shannon, Bell Syst. Tech. J, 28, 656 (1949).
34. W. Diffie, and M.E. Heilman, IEEE Trans. Inf. Theory, IT-22, 644 (1976).
35. R. Rivest, A. Shamir, and L. Adleman, On Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212 (January 1979).
36. P. Shor, (1994) Proc. of 35th Annual Symposium on the Foundations of Computer Science, (IEEE Computer Society, Los Alamitos), p. 124 (Extended Abstract). Full version of this paper appears in S. I. A. M. Journal on Computing, 26 (1997), 1484 and is also available at quant-ph/9508027.
37. S. Wiesner, SIGACT News, 15, 78 (1983); original manuscript written circa 1970.
38. C.H. Bennett and G. Brassard, in “Proc. IEEE Int. Conference on Computers, Systems and Signal Processing”, IEEE, New York, (1984).
39. J.F. Clauser and M.A, Horne, Phys. Rev. D 10, 526 (1974).
40. B. Huttner and A. Ekert, J. Mod. Opt., 41, 2455 (1994).
41. P.D. Townsend, Nature 385, 47 (1997).
42. C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J. Cryptol. 5, 3 (1992).
43. A. Muller, J. Breguet, and N. Gisin, Europhys. Lett. 23, 383 (1993).
44. A.K. Ekert, J.G. Rarity, P.R. Tapster, and G.M. Palma, Phys. Rev. Lett. 69 1293 (1992).
45. C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
46. A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
47. D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, Phys. Rev. Lett. 77, 2818 (1996); C. Macchiavello, Phys. Lett. A 246, 385 (1998).
48. Q.A. Turchette, C.J. Hood, W. Lange,H. Mabuchi, and H.J. Kimble, Phys. Rev. Lett. 75, 4710 (1995).
362 Список сносок
49. Bennett, С. Н., Brassard, G., Popescu, S., Schumacher, В., Smolin, J. A., Wootters, W. K. Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76, 722-725 (1996).
50. M. Horodecki, P. Horodecki, and R. Horodecki, Phys. Rev. Lett. 78 574 (1997).
51. G. Brassard and L. Salvai], Eurocrypt ‘93, Lofthus, Norway (1993).
52. B.A. Slutsky, R. Rao, P.-С. Sun and Y. Fainman, Phys.Rev.A 57, 2383 (1998).
53. J.I. Cirac and N. Gisin, Phys. Lett. A 229, 1 (1997)
54. C.A. Fuchs, N. Gisin, R.B. Griffiths, C.-S. Nrn, and A. Peres, Phys. Rev. A 56, 1163 (1997).
55. H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A 59, 4238 (1999).
56. N. Lutkenhaus, Phys. Rev. A 59, 3301 (1999).
57. C.H. Bennett, G. Brassard, C. Crepeau, and U. Maurer, 1994 IEEE International Symposium on Information Theory, Trondheim, Norway, June (1994).
58. A. Peres, Quantum Theory: Concepts and Methods, Kluwer Academic Publishers, (1995).
59. E. Biham, M. Boyer, G. Brassard, J. van de Graaf, and Т. Mor, Security of Quantum Key Distribution against all Collective attacks, quant-ph/9801022
(1998).
60. D. Mayers, Unconditional security in Quantum Cryptography, quant-ph/9802025 (1998).
61. M.N. Wegman, J.L. Carter, Journal of Computer find System Sciences 22, 265-279 (1981).
62. G. Rjbordy, J.D. Gautier, H. Zbinden, and N. Gisin, Applied Optics 37, 2272
(1998).
63. R.Y. Chiao and Y.S. Wu, Phys. Rev. Lett. 57, 933 (1986).
64. B.C. Jacobs and J.D. Franson, Opt. Lett. 21, 1854 (1996).
65. W.T. Buttler, R.J. Hughes, P.G. Kwiat, S.K. Lamoreaux, G.G. Luther, G.L. Morgan, J.E. Nordholt, C.G. Peterson, and C.M. Simmons, Los Alamos preprint, quant-ph/9805071.
66. P.D. Townsend, C. Marand, S.J.D. Phoenix, K.J. Blow, and S.M. Barnett, Phil. Trans. Roy. Soc. London A 354, 805 (1996).
67. R.J. Hughes, G.G. Luther, G.L. Morgan, C.G. Peterson, C.G. and C. Simmons, C. Quantum cryptography over underground optical fibres, Advances in Cryptology - Proceedings of Crypto’96, Springer, Berlin, Heidelberg (1996).
Предыдущая << 1 .. 133 134 135 136 137 138 < 139 > 140 141 142 143 144 145 .. 151 >> Следующая

Реклама

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed

Есть, чем поделиться? Отправьте
материал
нам
Авторские права © 2009 BooksShare.
Все права защищены.
Rambler's Top100

c1c0fc952cf0704ad12d6af2ad3bf47e03017fed