Cited By
View all- Astaburuaga ISengupta S(2024)Introduction to Quantum Systems and Security Vulnerabilities2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454809(345-351)Online publication date: 6-Jan-2024
- Liu BZhao BWu CYu WYou I(2015)Efficient Almost Strongly Universal Hash Function for Quantum Key DistributionInformation and Communication Technology10.1007/978-3-319-24315-3_29(282-285)Online publication date: 19-Nov-2015
- Zhou JLiu BZhao BLiu B(2014)A Pipeline Optimization Model for QKD Post-processing SystemInformation and Communication Technology10.1007/978-3-642-55032-4_48(472-481)Online publication date: 2014
- Show More Cited By