Decoy-state quantum key distribution with a leaky source
Tamaki K., Curty M., Lucamarini M., Gramegna Marcoquantum key distribution, device-independent quantum key distribution, quantum communication, security analysis, information leakage, Trojan horse attacks
Document type | Article |
Journal title / Source | New Journal of Physics |
Peer-reviewed article | 1 |
Volume | 18 |
Issue | June 2016 |
Page numbers / Article number | 065008 |
Publisher's name | IOP Publishing |
Publisher's address (city only) | Bristol (UK) |
Publication date | 2016-6-20 |
ISSN | 1367-2630 |
DOI | 10.1088/1367-2630/18/6/065008 |
Web URL | http://iopscience.iop.org/journal/1367-2630 |
Language | English |