MA Zhangchao. The cyber security challenge in thequantumera and its countermeasures[J]. Information and Communications Technology and Policy, 2019, 45(10): 37-42.
Singh, S. The code book: the science of secrecy from ancient egypt toquantumcryptography[M].Anchor, 2000.
[3]
Vernam, G. S. Cipher printing telegraph systems for secret wire and radio telegraphic communications[M]. Transactions of the American Institute of Electrical Engineers,1926,45:295-301.
[4]
Shannon, C. E. Communication theory of secrecy systems[M].Bell SystemTechnical Journal,1949,28(4):656-715.
[5]
Budiansky, S. Battle of wits: the complete story of codebreaking inWorldWar II[M],Simonand Schuster, 2000.
[6]
Jennewein, T., et al. A fast and compact quantum random number generator[M]. Review of Scientific Instruments, 2000,71(4):1675-1680.
[7]
Shor, P. W. Algorithms for quantum computation: Discrete logarithms and factoring[J]. Foundations of Computer Science,1994 Proceedings.,35thAnnualSymposiumon, Ieee.
[8]
Bennett Ch, H. and G. Brassard. Quantum cryptogra phypublic key distribution and coin tossing Int. Conf. on Computers, Systems and Signal Processing . Bangalore, India, Dec.1984.
[9]
L. Chen, S. Jordan, etc. NIST: report on post-quantum cryptography[R].NIST, 2016.