Login / Signup

Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols.

Vadim MakarovJohannes Skaar
Published in: Quantum Inf. Comput. (2008)
Keyphrases
  • computational complexity
  • genetic algorithm
  • database systems
  • multiscale
  • object detection
  • access control
  • countermeasures
  • key exchange