 Date: 2010-12-09 09:45:52Applied mathematics Decoy state Quantum key distribution ETSI Satellite Digital Radio Information-theoretic security Man-in-the-middle attack European Telecommunications Standards Institute Security parameter Cryptographic protocol Quantum cryptography Cryptography Quantum information science | | GS QKD[removed]V1[removed]Quantum Key Distribution (QKD); Security ProofsAdd to Reading ListSource URL: www.etsi.orgDownload Document from Source Website File Size: 137,48 KBShare Document on Facebook
|