Chrome Extension
WeChat Mini Program
Use on ChatGLM

Improved Security Bounds Against the Trojan-Horse Attack in Decoy-State Quantum Key Distribution

QUANTUM INFORMATION PROCESSING(2024)

Cited 0|Views0
Key words
Quantum key distribution,Trojan-horse attack,Quantum communication
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined