Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

10.1088/1367-2630/16/6/063009

Saved in:
Bibliographic Details
Main Authors: Hayashi, M, Nakayama, R
Other Authors: CENTRE FOR QUANTUM TECHNOLOGIES
Format: Article
Published: Institute of Physics Publishing 2020
Subjects:
Online Access:https://scholarbank.nus.edu.sg/handle/10635/180180
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: National University of Singapore

Similar Items