<--- Back to Details
First PageDocument Content
Physics / Applied mathematics / Quantum key distribution / BB84 / Qubit / No-cloning theorem / SARG04 / Decoy state / Quantum information science / Quantum cryptography / Theoretical computer science
Date: 2008-02-01 00:52:07
Physics
Applied mathematics
Quantum key distribution
BB84
Qubit
No-cloning theorem
SARG04
Decoy state
Quantum information science
Quantum cryptography
Theoretical computer science

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations Valerio Scarani1 , Antonio Ac´ın1 , Gr´egoire Ribordy2 and Nicolas Gisin1

Add to Reading List

Source URL: arxiv.org

Download Document from Source Website

File Size: 142,02 KB

Share Document on Facebook

Similar Documents

CS378, MA375T, PHY341  Homework 1 Homework 1 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

CS378, MA375T, PHY341  Homework 2 Homework 2 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

CS378, MA375T, PHY341  Homework 9 Homework 9 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 9 Homework 9 Introduction to Quantum Information Science

DocID: 1xVwY - View Document

CS378, MA375T, PHY341  Homework 4 Homework 4 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 4 Homework 4 Introduction to Quantum Information Science

DocID: 1xVe2 - View Document

CS378, MA375T, PHY341  Homework 6 Homework 6 Introduction to Quantum Information Science

CS378, MA375T, PHY341 Homework 6 Homework 6 Introduction to Quantum Information Science

DocID: 1xUVZ - View Document