1Shannon C E. Communication theory of secrecy system..Bell Syst. Tech Journal, 28 (1949), 656-715. 被引量:1
2Shor PW. Algorithms for quantum computation: diserete logarithms and factoring. In Proceedings of the 35 th Annual IEEE Symposium of Foundation of Computer Science, IEEE ComPuter SoeietyPress(1994), 124-134. 被引量:1
3Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm. ACM, 21(1978),120-126. 被引量:1
4ElGamal T. A public-key cryptosystem and a signature scheme Based on discrete logarithms. Adances in Cryptology: Proceedings of CRYPTO 84, Berlin: Springer-Verlag (1985), 10-18. 被引量:1
5Grover L K. Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett., 79(1997),325-328. 被引量:1
7C.H. Bennett and G..Brassard, Ouantum cryptography:public-key distribution and coin tossing, Proc. IEEE Int. Conf. on Computers, Systems and Signal Processmg, Bangalore, India(IEEE, New York, 1984),pp. 173-179. 被引量:1