Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Publisher: IOP Publishing
ISSN: 1367-2630
Source: New Journal of Physics, Vol.16, Iss.6, 2014-06, pp. : 140-175
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Finite-key security analysis of quantum key distribution with imperfect light sources
New Journal of Physics, Vol. 17, Iss. 9, 2015-09 ,pp. :