我不重要 发表于 2025-3-28 16:02:45

Attack Strategies on QKD Protocols,based on ideal sources, mainly using single photons as in but also entanglement-based protocols as, for example, in . Additionally, we will deal with the security of QKD protocols in realistic environments as they are described in Chap. 6. Regarding realistic sources, due to the physi

出生 发表于 2025-3-28 22:09:44

http://reply.papertrans.cn/17/1601/160086/160086_42.png
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Applied Quantum Cryptography; Christian Kollmitzer,Mario Pivk Book 2010 Springer-Verlag Berlin Heidelberg 2010 Coding and information.Cryp