메뉴 건너뛰기




Volumn 56, Issue 2, 1997, Pages 1163-1172

Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy

Author keywords

[No Author keywords available]

Indexed keywords


EID: 5344222062     PISSN: 10502947     EISSN: 10941622     Source Type: Journal    
DOI: 10.1103/PhysRevA.56.1163     Document Type: Article
Times cited : (456)

References (30)
  • 8
    • 85037197622 scopus 로고    scopus 로고
    • C.-S. Niu and R. B. Griffiths (unpublished).
    • C.-S. Niu and R. B. Griffiths (unpublished).
  • 15
    • 85037229264 scopus 로고    scopus 로고
    • Recently it has been pointed out to us that Eq. (4) in that work contains an eavesdropping stategy that happens to achieve the bound in our Eq. (65). However, Biham and Mor did not study the optimality issue in their work.
    • see also E. Biham and T. Mor, Report No. . Recently it has been pointed out to us that Eq. (4) in that work contains an eavesdropping stategy that happens to achieve the bound in our Eq. (65). However, Biham and Mor did not study the optimality issue in their work.
    • Biham, E.1    Mor, T.2
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.