-
1
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden (2002), Quantum cryptography, Rev. Mod. Phys. 74, pp. 145.
-
(2002)
Rev. Mod. Phys
, vol.74
, pp. 145
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
2
-
-
34547494794
-
-
M. Dušek, N. Lütkenhaus, M. Hendrych, Quantum cryptography, to appear in Progress in Optics 49, Edt. E. Wolf (Elsevier).
-
M. Dušek, N. Lütkenhaus, M. Hendrych, Quantum cryptography, to appear in Progress in Optics 49, Edt. E. Wolf (Elsevier).
-
-
-
-
3
-
-
0000478763
-
Cipher printing telegraph systems
-
G. S. Vernam (1926), Cipher printing telegraph systems, Trans. of the AIEE 45, pp. 295.
-
(1926)
Trans. of the AIEE
, vol.45
, pp. 295
-
-
Vernam, G.S.1
-
4
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India IEEE Press, New York, pp
-
C H. Bennett and G. Brassard (1984), Quantum cryptography: public key distribution and coin tossing, Proc. IEEE Int. Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE Press, New York), pp. 175.
-
(1984)
Proc. IEEE Int. Conference on Computers, Systems and Signal Processing
, pp. 175
-
-
Bennett, C.H.1
Brassard, G.2
-
5
-
-
3042730516
-
Unconditional security in quantum cryptography
-
D. Mayers (2001), Unconditional security in quantum cryptography, J. of ACM 48, pp. 351.
-
(2001)
J. of ACM
, vol.48
, pp. 351
-
-
Mayers, D.1
-
6
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau (1999), Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, pp. 2050.
-
(1999)
Science
, vol.283
, pp. 2050
-
-
Lo, H.-K.1
Chau, H.F.2
-
7
-
-
0033702887
-
A proof of the security of quantum key distribution
-
New York, USA ACM Press, New York
-
E. Biham, M. Boyer, P. O. Boykin, T. Mor and V. Roychowdhury (2000), A proof of the security of quantum key distribution, in Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, New York, USA (ACM Press, New York, 2000), pp. 715.
-
(2000)
Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing
, pp. 715
-
-
Biham, E.1
Boyer, M.2
Boykin, P.O.3
Mor, T.4
Roychowdhury, V.5
-
8
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85, pp. 441.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 441
-
-
Shor, P.W.1
Preskill, J.2
-
9
-
-
0026626314
-
Experimental Quantum Cryptography
-
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin (1992), Experimental Quantum Cryptography, J. Cryptology 5, pp. 3.
-
(1992)
J. Cryptology
, vol.5
, pp. 3
-
-
Bennett, C.H.1
Bessette, F.2
Brassard, G.3
Salvail, L.4
Smolin, J.5
-
10
-
-
0029357908
-
Quantum key distribution over distances as long as 30 km
-
C. Marand and P. D. Townsend (1995), Quantum key distribution over distances as long as 30 km, Opt. Lett. 20, pp. 1695.
-
(1995)
Opt. Lett
, vol.20
, pp. 1695
-
-
Marand, C.1
Townsend, P.D.2
-
12
-
-
0010758769
-
Practical free-space quantum key distribution over 10 km in daylight and at night
-
R. J. Hughes, J. E. Nordholt, D. Derkacs and C. G. Peterson (2002), Practical free-space quantum key distribution over 10 km in daylight and at night, New J. Phys. 4, pp. 43.
-
(2002)
New J. Phys
, vol.4
, pp. 43
-
-
Hughes, R.J.1
Nordholt, J.E.2
Derkacs, D.3
Peterson, C.G.4
-
13
-
-
0011769922
-
Quantum key distribution over 67 km with a plug&play system
-
D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden (2002), Quantum key distribution over 67 km with a plug&play system, New J. Phys., 4 pp. 41.
-
(2002)
New J. Phys
, vol.4
, pp. 41
-
-
Stucki, D.1
Gisin, N.2
Guinnard, O.3
Ribordy, G.4
Zbinden, H.5
-
14
-
-
2942611260
-
Quantum key distribution over 122 km of standard telecom fiber
-
C Gobby, Z. L. Yuan, and A. J. Shields (2004), Quantum key distribution over 122 km of standard telecom fiber, Appl. Phys. Lett. 84, pp. 3762.
-
(2004)
Appl. Phys. Lett
, vol.84
, pp. 3762
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
15
-
-
11144327171
-
Unconditionally secure quantum key distribution over 50 km of standard telecom fibre
-
C. Gobby, Z. L. Yuan, and A. J. Shields (2004), Unconditionally secure quantum key distribution over 50 km of standard telecom fibre, Electron. Lett. 40, pp. 1603.
-
(2004)
Electron. Lett
, vol.40
, pp. 1603
-
-
Gobby, C.1
Yuan, Z.L.2
Shields, A.J.3
-
16
-
-
0000600063
-
Quantum cryptography with coherent states
-
B. Huttner, N. Imoto, N. Gisin and T. Mor (1995), Quantum cryptography with coherent states, Phys. Rev. A 51, pp. 1863.
-
(1995)
Phys. Rev. A
, vol.51
, pp. 1863
-
-
Huttner, B.1
Imoto, N.2
Gisin, N.3
Mor, T.4
-
17
-
-
0343536431
-
Limitations on practical quantum cryptography
-
G. Brassard, N. Lütkenhaus, T. Mor and B. C. Sanders (2000), Limitations on practical quantum cryptography, Phys. Rev. Lett. 85, pp. 1330.
-
(2000)
Phys. Rev. Lett
, vol.85
, pp. 1330
-
-
Brassard, G.1
Lütkenhaus, N.2
Mor, T.3
Sanders, B.C.4
-
19
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill (2004), Security of quantum key distribution with imperfect devices, Quant. Inf. Comp. 4, pp. 325.
-
(2004)
Quant. Inf. Comp
, vol.4
, pp. 325
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
20
-
-
0041415963
-
Quantum Key Distribution with High Loss: Toward Global Secure Communication
-
W.-Y. Hwang (2003), Quantum Key Distribution with High Loss: Toward Global Secure Communication, Phys. Rev. Lett. 91, pp. 057901.
-
(2003)
Phys. Rev. Lett
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
21
-
-
27744479495
-
Decoy state quantum key distribution
-
H.-K. Lo, X. Ma, K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett. 94, pp. 230504.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230504
-
-
Lo, H.-K.1
Ma, X.2
Chen, K.3
-
22
-
-
27744568650
-
Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography
-
X.-B. Wang (2005), Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography, Phys. Rev. Lett. 94, pp. 230503.
-
(2005)
Phys. Rev. Lett
, vol.94
, pp. 230503
-
-
Wang, X.-B.1
-
23
-
-
27144453296
-
Practical decoy state for quantum key distribution
-
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo (2005), Practical decoy state for quantum key distribution, Phys. Rev. A. 72, pp. 012326.
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012326
-
-
Ma, X.1
Qi, B.2
Zhao, Y.3
Lo, H.-K.4
-
24
-
-
27144532069
-
Decoy-state protocol for quantum cryptography with four different intensities of coherent light
-
X.-B. Wang (2005), Decoy-state protocol for quantum cryptography with four different intensities of coherent light, Phys. Rev. A 72, pp. 012322.
-
(2005)
Phys. Rev. A
, vol.72
, pp. 012322
-
-
Wang, X.-B.1
-
25
-
-
27144532069
-
-
X.-B. Wang (2005), Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)], Phys. Rev. A 72, pp. 049908.
-
X.-B. Wang (2005), Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)], Phys. Rev. A 72, pp. 049908.
-
-
-
-
27
-
-
33748998157
-
Decoy-state quantum key distribution with two-way classical postprocessing
-
X. Ma, C.-H. F. Fung, F. Dupuis, K. Chen, K. Tamaki, and H.-K. Lo (2006), Decoy-state quantum key distribution with two-way classical postprocessing, Phys. Rev. A 74, pp. 032330.
-
(2006)
Phys. Rev. A
, vol.74
, pp. 032330
-
-
Ma, X.1
Fung, C.-H.F.2
Dupuis, F.3
Chen, K.4
Tamaki, K.5
Lo, H.-K.6
-
28
-
-
33344454530
-
Experimental Quantum Key Distribution with Decoy States
-
Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian (2006), Experimental Quantum Key Distribution with Decoy States, Phys. Rev. Lett. 96, pp. 070502.
-
(2006)
Phys. Rev. Lett
, vol.96
, pp. 070502
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
29
-
-
39049171347
-
Simulation and Implementation of Decoy State Quantum Key Distribution over 60 km Telecom Fiber
-
Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian (2006), Simulation and Implementation of Decoy State Quantum Key Distribution over 60 km Telecom Fiber, Proc. of IEEE International Symposium on Information Theory (ISIT'06), pp. 2094.
-
(2006)
Proc. of IEEE International Symposium on Information Theory (ISIT'06)
, pp. 2094
-
-
Zhao, Y.1
Qi, B.2
Ma, X.3
Lo, H.-K.4
Qian, L.5
-
30
-
-
33846356424
-
Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding
-
C.-Z. Peng, J. Zhang, D. Yang, W.-B. Gao, H.-X. Ma, H. Yin, H.-P. Zeng, T. Yang, X.-B. Wang, and J.-W. Pan (2007), Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding, Phys. Rev. Lett. 98, pp. 010505.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010505
-
-
Peng, C.-Z.1
Zhang, J.2
Yang, D.3
Gao, W.-B.4
Ma, H.-X.5
Yin, H.6
Zeng, H.-P.7
Yang, T.8
Wang, X.-B.9
Pan, J.-W.10
-
31
-
-
33846363964
-
Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber
-
D. Rosenberg, J. W. Harrington, P. R. Rice, P. A. Hiskett, C. G. Peterson, R. J. Hughes, A. E. Lita, S. W. Nam, and J. E. Nordholt (2007), Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber, Phys. Rev. Lett. 98, pp. 010503.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010503
-
-
Rosenberg, D.1
Harrington, J.W.2
Rice, P.R.3
Hiskett, P.A.4
Peterson, C.G.5
Hughes, R.J.6
Lita, A.E.7
Nam, S.W.8
Nordholt, J.E.9
-
32
-
-
33846383808
-
Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km
-
T. Schmitt-Manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher, T. Scheidl, J. Perdigues, Z. Sodnik, C. Kurtsiefer, J. G. Rarity, A. Zeilinger, and H. Weinfurter (2007), Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km Phys. Rev. Lett. 98, pp. 010504.
-
(2007)
Phys. Rev. Lett
, vol.98
, pp. 010504
-
-
Schmitt-Manderbach, T.1
Weier, H.2
Fürst, M.3
Ursin, R.4
Tiefenbacher, F.5
Scheidl, T.6
Perdigues, J.7
Sodnik, Z.8
Kurtsiefer, C.9
Rarity, J.G.10
Zeilinger, A.11
Weinfurter, H.12
-
33
-
-
33846057430
-
Unconditionally secure one-way quantum key distribution using decoy pulses
-
Z. L. Yuan, A. W. Sharpe, A. J. Shields (2007), Unconditionally secure one-way quantum key distribution using decoy pulses, Appl. Phys. Lett. 90, pp. 011118.
-
(2007)
Appl. Phys. Lett
, vol.90
, pp. 011118
-
-
Yuan, Z.L.1
Sharpe, A.W.2
Shields, A.J.3
-
34
-
-
11944254075
-
Quantum cryptography using any two nonorthogonal states
-
C. H. Bennett (1992), Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, pp. 3121.
-
(1992)
Phys. Rev. Lett
, vol.68
, pp. 3121
-
-
Bennett, C.H.1
-
35
-
-
19644377760
-
Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse
-
M. Koashi (2004), Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse, Phys. Rev. Lett. 93, pp. 120501.
-
(2004)
Phys. Rev. Lett
, vol.93
, pp. 120501
-
-
Koashi, M.1
-
36
-
-
34547516163
-
Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse
-
quantph/0607082
-
K. Tamaki, N. Lütkenhaus, M. Koashi, and J. Batuwantudawe (2006), Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse, quantph/0607082.
-
(2006)
-
-
Tamaki, K.1
Lütkenhaus, N.2
Koashi, M.3
Batuwantudawe, J.4
-
37
-
-
0037101027
-
Differential Phase Shift Quantum Key Distribution
-
K. Inoue, E. Waks, and Y. Yamamoto (2002), Differential Phase Shift Quantum Key Distribution, Phys. Rev. Lett. 89, pp. 037902.
-
(2002)
Phys. Rev. Lett
, vol.89
, pp. 037902
-
-
Inoue, K.1
Waks, E.2
Yamamoto, Y.3
-
38
-
-
0142025187
-
Differential-phase-shift quantum key distribution using coherent light
-
K. Inoue, E. Waks, and Y. Yamamoto (2003), Differential-phase-shift quantum key distribution using coherent light, Phys. Rev. A 68, pp. 022317.
-
(2003)
Phys. Rev. A
, vol.68
, pp. 022317
-
-
Inoue, K.1
Waks, E.2
Yamamoto, Y.3
-
39
-
-
33144478746
-
Security of differential-phase-shift quantum key distribution against individual attacks
-
E. Waks, H. Takesue, and Y. Yamamoto (2006), Security of differential-phase-shift quantum key distribution against individual attacks, Phys. Rev. A 73, pp. 012344.
-
(2006)
Phys. Rev. A
, vol.73
, pp. 012344
-
-
Waks, E.1
Takesue, H.2
Yamamoto, Y.3
-
40
-
-
27744485456
-
Differential phase shift quantum key distribution experiment over 105 km fibre
-
H. Takesue, E. Diamanti, T. Honjo, C. Langrock, M. M. Fejer, K. Inoue, and Y. Yamamoto (2005), Differential phase shift quantum key distribution experiment over 105 km fibre, New J. Phys. 7, pp. 232.
-
(2005)
New J. Phys
, vol.7
, pp. 232
-
-
Takesue, H.1
Diamanti, E.2
Honjo, T.3
Langrock, C.4
Fejer, M.M.5
Inoue, K.6
Yamamoto, Y.7
-
41
-
-
33845749064
-
100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors
-
E. Diamanti, H. Takesue, C. Langrock, M. M. Fejer, and Y. Yamamoto (2006), 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors, Opt. Express 14, pp. 13073.
-
(2006)
Opt. Express
, vol.14
, pp. 13073
-
-
Diamanti, E.1
Takesue, H.2
Langrock, C.3
Fejer, M.M.4
Yamamoto, Y.5
-
42
-
-
0342844378
-
Unambiguous state discrimination in quantum cryptography with weak coherent states
-
M. Dulek, M. Jahma, and N. Lütkenhaus (2000), Unambiguous state discrimination in quantum cryptography with weak coherent states, Phys. Rev. A 62, pp. 022306.
-
(2000)
Phys. Rev. A
, vol.62
, pp. 022306
-
-
Dulek, M.1
Jahma, M.2
Lütkenhaus, N.3
-
43
-
-
0035841898
-
Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
-
S. Félix, N. Gisin, A. Stefanov and H. Zbinden (2001), Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses, J. Mod. Opt. 48, pp. 2009.
-
(2001)
J. Mod. Opt
, vol.48
, pp. 2009
-
-
Félix, S.1
Gisin, N.2
Stefanov, A.3
Zbinden, H.4
-
44
-
-
26944440391
-
Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses
-
M. Curty, and N. Lütkenhaus (2005), Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses, Phys. Rev. A 71, pp. 062301.
-
(2005)
Phys. Rev. A
, vol.71
, pp. 062301
-
-
Curty, M.1
Lütkenhaus, N.2
-
45
-
-
3142519923
-
Entanglement as a precondition for secure quantum key distribution
-
M. Curty, M. Lewenstein, and N. Lütkenhaus (2004), Entanglement as a precondition for secure quantum key distribution, Phys. Rev. Lett. 92, pp. 217903.
-
(2004)
Phys. Rev. Lett
, vol.92
, pp. 217903
-
-
Curty, M.1
Lewenstein, M.2
Lütkenhaus, N.3
-
46
-
-
33344457494
-
Detecting two-party correlations in quantum key distribution protocols
-
M. Curty, O. Gühne, M. Lewenstein, and N. Lütkenhaus (2005), Detecting two-party correlations in quantum key distribution protocols, Phys. Rev. A 71, pp. 022306.
-
(2005)
Phys. Rev. A
, vol.71
, pp. 022306
-
-
Curty, M.1
Gühne, O.2
Lewenstein, M.3
Lütkenhaus, N.4
-
47
-
-
0000643186
-
How to differentiate between non-orthogonal states
-
I. D. Ivanovic (1987), How to differentiate between non-orthogonal states, Phys. Lett. A 123, pp. 257.
-
(1987)
Phys. Lett. A
, vol.123
, pp. 257
-
-
Ivanovic, I.D.1
-
48
-
-
0000691940
-
Overlap and distinguishability of quantum states
-
D. Dieks (1988), Overlap and distinguishability of quantum states, Phys. Lett. A 126, pp. 303.
-
(1988)
Phys. Lett. A
, vol.126
, pp. 303
-
-
Dieks, D.1
-
49
-
-
0002027240
-
How to differentiate between non-orthogonal states
-
A. Peres (1988), How to differentiate between non-orthogonal states, Phys. Lett. A 128, pp. 19.
-
(1988)
Phys. Lett. A
, vol.128
, pp. 19
-
-
Peres, A.1
-
50
-
-
0002326347
-
Optimal distinction between two non-orthogonal quantum states
-
G. Jaeger, and A. Shimony (1995), Optimal distinction between two non-orthogonal quantum states, Phys. Lett. A 197, pp. 83.
-
(1995)
Phys. Lett. A
, vol.197
, pp. 83
-
-
Jaeger, G.1
Shimony, A.2
-
51
-
-
0347417034
-
Optimum unambiguous discrimination between linearly independent symmetric states
-
A. Chefies, and S. M. Barnett (1998), Optimum unambiguous discrimination between linearly independent symmetric states, Phys. Lett. A 250, pp. 223.
-
(1998)
Phys. Lett. A
, vol.250
, pp. 223
-
-
Chefies, A.1
Barnett, S.M.2
-
53
-
-
0034310204
-
Quantum state discrimination
-
A. Chefles (2000), Quantum state discrimination, Contemporary Phys. 41, pp. 401.
-
(2000)
Contemporary Phys
, vol.41
, pp. 401
-
-
Chefles, A.1
-
54
-
-
0141481846
-
Entanglement breaking channels
-
M. Horodecki, P. W. Shor, and M. B. Ruskai (2003), Entanglement breaking channels, Rev. Math. Phys. 15, pp. 629.
-
(2003)
Rev. Math. Phys
, vol.15
, pp. 629
-
-
Horodecki, M.1
Shor, P.W.2
Ruskai, M.B.3
-
55
-
-
0141816571
-
Qubit entanglement breaking channels
-
M. B. Ruskai (2003), Qubit entanglement breaking channels, Rev. Math. Phys. 15, pp. 643.
-
(2003)
Rev. Math. Phys
, vol.15
, pp. 643
-
-
Ruskai, M.B.1
-
56
-
-
27644570716
-
Fast and simple one-way quantum key distribution
-
D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden (2005), Fast and simple one-way quantum key distribution, Appl. Phys. Lett. 87, pp. 194108.
-
(2005)
Appl. Phys. Lett
, vol.87
, pp. 194108
-
-
Stucki, D.1
Brunner, N.2
Gisin, N.3
Scarani, V.4
Zbinden, H.5
-
57
-
-
27744517529
-
-
quant-ph/0411022
-
N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner, and V. Scarani (2004), Towards practical and fast Quantum Cryptography, quant-ph/0411022.
-
(2004)
Towards practical and fast Quantum Cryptography
-
-
Gisin, N.1
Ribordy, G.2
Zbinden, H.3
Stucki, D.4
Brunner, N.5
Scarani, V.6
-
58
-
-
34547535907
-
Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography
-
C Branciard, N. Gisin, N. Liitkenhaus, and V. Scarani (2007), Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography, Quant. Inf. Comp. 7, pp. 639.
-
(2007)
Quant. Inf. Comp
, vol.7
, pp. 639
-
-
Branciard, C.1
Gisin, N.2
Liitkenhaus, N.3
Scarani, V.4
-
59
-
-
0342656182
-
Quantum key distribution: Theory for application
-
N. Lütkenhaus (1999), Quantum key distribution: theory for application, Applied Phys. B 69, pp. 395.
-
(1999)
Applied Phys. B
, vol.69
, pp. 395
-
-
Lütkenhaus, N.1
-
60
-
-
0003233008
-
States, Effects, and Operations
-
in, A. Böhm, J. D. Dollard and W. Wootters eds, Springer, Berlin
-
K. Kraus (1983), in States, Effects, and Operations, No. 190 in Lecture Notes in Physics, A. Böhm, J. D. Dollard and W. Wootters eds., Springer, Berlin.
-
(1983)
Lecture Notes in Physics
, vol.190
-
-
Kraus, K.1
|