Author:
Liu Jinlong,Yang Zhutian,Wu Zhilu
Reference10 articles.
1. Göpfert, F., Vredendaal, C.V., Wunderer T.: A hybrid lattice basis reduction and quantum search attack on LWE. In: International Workshop on Post-Quantum Cryptography, pp. 184–202. Springer, Cham (2017)
2. Wei, K., Liu, H., Ma, H.: Feasible attack on detector-device-independent quantum key distribution. Sci. Rep. 7, 449 (2017)
3. Gyongyosi, L., Imre, S.: Geometrical estimation of information-theoretical impacts of incoherent attacks for quantum cryptography. Int. Rev. Phys. (2010)
4. Gisin, N., Fasel, S., Kraus, B.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 457–460 (2006)
5. Kulik, S.P., Molotkov, S.N.: Decoy state method for quantum cryptography based on phase coding into faint laser pulses. Laser Phys. Lett. 14, 125205 (2017)