共 50 条
- [1] Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution PHYSICAL REVIEW X, 2015, 5 (03):
- [4] Trojan-horse attacks on quantum key distribution with classical Bob Quantum Information Processing, 2015, 14 : 681 - 686
- [5] Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis PHYSICAL REVIEW APPLIED, 2024, 22 (03):
- [9] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution Quantum Information Processing, 23