Numerical Security Proof for the Decoy-State BB84 Protocol and Measurement-Device-independent Quantum Key Distribution Resistant Against Large Basis Misalignment
Physical Review Research(2022)
Key words
Backside Analysis
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined