Date: 2008-02-01 00:52:07Physics Applied mathematics Quantum key distribution BB84 Qubit No-cloning theorem SARG04 Decoy state Quantum information science Quantum cryptography Theoretical computer science | | Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations Valerio Scarani1 , Antonio Ac´ın1 , Gr´egoire Ribordy2 and Nicolas Gisin1Add to Reading ListSource URL: arxiv.orgDownload Document from Source Website File Size: 142,02 KBShare Document on Facebook
|