<< . .

. 2
( : 2)



exploiting multiphoton pulses J. Mod. Opt. 48 2009“22
[12] Tancevski L, Slutsky B, Rao R and Fainman S 1997 Proc. SPIE 3228 322
[13] Fuchs C A, Gisin N, Grif¬ths R B, Niu C S and Peres A 1997 Optimal eavesdropping in quantum cryptography:
I. Phys. Rev. A 56 1163“72
[14] Zbinden H, Gisin N, Huttner B, Muller A and Tittel W 2000 Practical aspects of quantum cryptographic key
distribution J. Cryptol. 13 207“20
[15] id Quantique SA, www.idquantique.com


New Journal of Physics 4 (2002) 41.1“41.8 (http://www.njp.org/)

<< . .

. 2
( : 2)