Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
Crossref DOI link: https://doi.org/10.1007/s11128-020-02694-6
Published Online: 2020-05-29
Published Print: 2020-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wang, Weilong
Meng, Xiangdong
Fei, Yangyang
Ma, Zhi
Text and Data Mining valid from 2020-05-29
Version of Record valid from 2020-05-29
Article History
First Online: 29 May 2020