Sign in

Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution.

Zijian LiBingbing ZhengChengxian ZhangZhenrong ZhangHong-Bo XieKejin Wei
Published in: Quantum Inf. Process. (2024)
Keyphrases