A carregar...
Invisible Trojan-horse attack
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance agai...
Na minha lista:
Publicado no: | Sci Rep |
---|---|
Main Authors: | , , , |
Formato: | Artigo |
Idioma: | Inglês |
Publicado em: |
Nature Publishing Group UK
2017
|
Assuntos: | |
Acesso em linha: | https://ncbi.nlm.nih.gov/pmc/articles/PMC5566943/ https://ncbi.nlm.nih.gov/pubmed/28827553 https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1038/s41598-017-08279-1 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|