Showing results 1 to 6 of 6
Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin, QUANTUM INFORMATION PROCESSING, v.15, no.10, pp.4265 - 4282, 2016-10 |
Key distillation from quantum channels using two-way communication protocols Bae, Joonwoo; Acin, Antonio, PHYSICAL REVIEW A, v.75, no.1, 2007-01 |
Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II Song, Won Taek; Choi, Jinho; Ha, Jeongseok, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.7, no.4, pp.1414 - 1418, 2012-08 |
Secrecy properties of quantum channels Acin, A; Bae, Joonwoo; Bagan, E; Baig, M; Masanes, L; Munoz-Tapia, R, PHYSICAL REVIEW A, v.73, no.1, 2006-01 |
Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack Im, Sanghun; Jeon, Hyoungsuk; Choi, Jinho; Ha, Jeongseok, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.14, no.12, pp.6579 - 6594, 2015-12 |
The Error Tolerance Bound for Secure Multi-Qubit QKD Against Incoherent Attack Lim, Kyongchun; Ko, Heasin; Kim, Kiung; Suh, Changho; Rhee, June Koo Kevin, IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, v.21, no.3, 2015-06 |
Discover