Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography
Crossref DOI link: https://doi.org/10.1134/S1063776120050064
Published Online: 2020-09-01
Published Print: 2020-06
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Molotkov, S. N.
Text and Data Mining valid from 2020-06-01
Version of Record valid from 2020-06-01
Article History
Received: 16 October 2019
Revised: 23 December 2019
Accepted: 23 December 2019
First Online: 1 September 2020