Long-distance decoy-state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice, PA Hiskett… - Physical review …, 2007 - APS
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

[PDF][PDF] Long distance decoy state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice… - arXiv preprint quant-ph …, 2006 - core.ac.uk
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

Long distance decoy state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice… - arXiv preprint quant-ph …, 2006 - arxiv.org
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

[PDF][PDF] Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber

D Rosenberg, JW Harrington, PR Rice… - arXiv preprint quant-ph … - academia.edu
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

[PDF][PDF] Long distance decoy state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice… - arXiv preprint quant …, 2006 - scholar.archive.org
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

[引用][C] Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber

D ROSENBERG - Phys. Rev. Lett., 2007 - cir.nii.ac.jp
Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber | CiNii Research CiNii
国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

Long distance decoy state quantum key distribution in optical fiber

D Rosenberg, JA Harrington, PR Rice, PA Hiskett… - 2007 - nist.gov
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

Long-distance decoy-state quantum key distribution in optical fiber.

D Rosenberg, JW Harrington, PR Rice… - Physical Review …, 2007 - europepmc.org
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber

D Rosenberg, JW Harrington, PR Rice… - Physical Review …, 2007 - ui.adsabs.harvard.edu
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

[PDF][PDF] Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber

D Rosenberg, JW Harrington, PR Rice… - arXiv preprint quant-ph … - researchgate.net
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …