Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

Title
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
Authors
Keywords
-
Journal
NEW JOURNAL OF PHYSICS
Volume 16, Issue 6, Pages 063009
Publisher
IOP Publishing
Online
2014-06-05
DOI
10.1088/1367-2630/16/6/063009

Ask authors/readers for more resources

Discover Peeref hubs

Discuss science. Find collaborators. Network.

Join a conversation

Add your recorded webinar

Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.

Upload Now