Pages that link to "Item:Q5143230"
From MaRDI portal
The following pages link to Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths (Q5143230):
Displaying 6 items.
- Differential phase encoded measurement-device-independent quantum key distribution (Q2687107) (← links)
- The security analysis of the BB84 protocol in the case of Calderbank–Shor–Steane code leakage (Q5074439) (← links)
- Finite-key security analysis of quantum key distribution with imperfect light sources (Q5136090) (← links)
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths (Q5137709) (← links)
- Sifting attacks in finite-size quantum key distribution (Q5855042) (← links)
- Theoretical and simulation investigation of practical QKD for both BB84 and SARG04 protocols (Q6580214) (← links)