文
论文分享
演练场
杂货铺
论文推荐
字
编辑器下载
登录
注册
Xiang-dong Meng
发表
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
Zhi Ma, Weilong Wang, Xiang-dong Meng, 2020, Quantum Inf. Process..