Security analysis of the decoy method with the...

Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

Hayashi, Masahito, Nakayama, Ryota
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
16
Language:
english
Journal:
New Journal of Physics
DOI:
10.1088/1367-2630/16/6/063009
Date:
June, 2014
File:
PDF, 945 KB
english, 2014
Conversion to is in progress
Conversion to is failed