Article,

Attacks on quantum key distribution protocols that employ non-ITS authentication.

, , , , , , and .
Quantum Information Processing, 15 (1): 327-362 (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews