Login / Signup
Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols.
Vadim Makarov
Johannes Skaar
Published in:
Quantum Inf. Comput. (2008)
Keyphrases
</>
computational complexity
genetic algorithm
database systems
multiscale
object detection
access control
countermeasures
key exchange