Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
10.1088/1367-2630/16/6/063009
Saved in:
Main Authors: | Hayashi, M, Nakayama, R |
---|---|
Other Authors: | CENTRE FOR QUANTUM TECHNOLOGIES |
Format: | Article |
Published: |
Institute of Physics Publishing
2020
|
Subjects: | |
Online Access: | https://scholarbank.nus.edu.sg/handle/10635/180180 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
Thwarting the photon number splitting attack with entanglement enhanced BB84 quantum key distribution
by: Sabottke, C.F., et al.
Published: (2014) -
Error correction with chaotic switching between convolutional codecs
by: Ng, T.Y., et al.
Published: (2014) -
Raw-data attacks in Quantum cryptography with partial tomography
by: Assad, S.M., et al.
Published: (2014) -
Codes for key generation in quantum cryptography
by: Englert, B.-G., et al.
Published: (2014) -
Efficient error estimating coding: Feasibility and applications
by: Chen, B., et al.
Published: (2013)