我不重要 发表于 2025-3-28 16:02:45
Attack Strategies on QKD Protocols,based on ideal sources, mainly using single photons as in but also entanglement-based protocols as, for example, in . Additionally, we will deal with the security of QKD protocols in realistic environments as they are described in Chap. 6. Regarding realistic sources, due to the physi出生 发表于 2025-3-28 22:09:44
http://reply.papertrans.cn/17/1601/160086/160086_42.png