"Improved security bounds against the Trojan-horse attack in decoy-state ..."

Zijian Li et al. (2024)

Details and statistics

DOI: 10.1007/S11128-023-04238-0

access: closed

type: Journal Article

metadata version: 2024-04-01

a service of  Schloss Dagstuhl - Leibniz Center for Informatics