Keyword : trojan horse attack

Security Proof of Quantum Key Distribution
Kiyoshi TAMAKI Toyohiro TSURUMARU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/05/01
Vol. E93-A  No. 5 ; pp. 880-888
Type of Manuscript:  INVITED PAPER (Special Section on Leading-Edge Developments in Quantum Cryptographic Systems)
unconditional securityone-time padquantum key distributiontrojan horse attack
 Summary | Full Text:PDF(371.5KB)