Weak randomness completely trounces the security of QKD
| Authors | |
|---|---|
| Year of publication | 2012 |
| Type | Conference abstract |
| Citation | |
| Related projects: |
|
| Authors | |
|---|---|
| Year of publication | 2012 |
| Type | Conference abstract |
| Citation | |
| Related projects: |
|