Trojan Horse Attacks, Decoy State Method, and Side Channels...

Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography

Molotkov, S. N.
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
130
Journal:
Journal of Experimental and Theoretical Physics
DOI:
10.1134/S1063776120050064
Date:
June, 2020
File:
PDF, 1.56 MB
2020
Conversion to is in progress
Conversion to is failed