Login / Signup

Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator.

Weilong WangXiangdong MengYangyang FeiZhi Ma
Published in: Quantum Inf. Process. (2020)
Keyphrases