[HTML][HTML] Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun, J Xiao… - Scientific reports, 2017 - nature.com
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

[HTML][HTML] Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun… - Scientific …, 2017 - ncbi.nlm.nih.gov
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun… - Scientific …, 2017 - ui.adsabs.harvard.edu
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang… - Scientific …, 2017 - pubmed.ncbi.nlm.nih.gov
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

Feasible attack on detector-device-independent quantum key distribution.

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun… - Scientific …, 2017 - europepmc.org
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …