Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

Publisher: IOP Publishing

ISSN: 1367-2630

Source: New Journal of Physics, Vol.16, Iss.6, 2014-06, pp. : 140-175

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract