Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The evolution of quantum secure direct communication: On the road to the qinternet
Communication security has to evolve to a higher plane in the face of the threat from the
massive computing power of the emerging quantum computers. Quantum secure direct …
massive computing power of the emerging quantum computers. Quantum secure direct …
Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Implementation and security analysis of practical quantum secure direct communication
Rapid development of supercomputers and the prospect of quantum computers are posing
increasingly serious threats to the security of communication. Using the principles of …
increasingly serious threats to the security of communication. Using the principles of …
Proof-of-principle experimental demonstration of twin-field type quantum key distribution
The twin-field (TF) quantum key distribution (QKD) protocol and its variants are highly
attractive because they can beat the well-known fundamental limit of the secret key rate for …
attractive because they can beat the well-known fundamental limit of the secret key rate for …
Fully device independent quantum key distribution
U Vazirani, T Vidick - Communications of the ACM, 2019 - dl.acm.org
Quantum cryptography promises levels of security that are impossible to attain in a classical
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
world. Can this security be guaranteed to classical users of a quantum protocol, who may …
Hacking commercial quantum cryptography systems by tailored bright illumination
The peculiar properties of quantum mechanics allow two remote parties to communicate a
private, secret key, which is protected from eavesdrop** by the laws of physics 1, 2, 3, 4 …
private, secret key, which is protected from eavesdrop** by the laws of physics 1, 2, 3, 4 …
Quantum cryptography
Quantum cryptography Page 1 Quantum cryptography Nicolas Gisin, Grégoire Ribordy,
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
Wolfgang Tittel, and Hugo Zbinden Group of Applied Physics, University of Geneva, 1211 …
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …
mature technology, already fit for commercialization. It aims at the creation of a secret key …
Quantum information and computation
CH Bennett, DP DiVincenzo - nature, 2000 - nature.com
In information processing, as in physics, our classical world view provides an incomplete
approximation to an underlying quantum reality. Quantum effects like interference and …
approximation to an underlying quantum reality. Quantum effects like interference and …
Quantum computation over continuous variables
S Lloyd, SL Braunstein - Physical Review Letters, 1999 - APS
This paper provides necessary and sufficient conditions for constructing a universal
quantum computer over continuous variables. As an example, it is shown how a universal …
quantum computer over continuous variables. As an example, it is shown how a universal …