Author of the publication

Trojan-horse attacks on quantum key distribution with classical Bob.

, , and . Quantum Inf. Process., 14 (2): 681-686 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New quantum key agreement protocols based on Bell states., , , , and . Quantum Inf. Process., 18 (10): 322 (2019)Comment on "The enhanced quantum blind signature protocol"., , and . Quantum Inf. Process., 13 (6): 1305-1312 (2014)Revisiting the security of secure direct communication based on ping-pong protocolQuantum Inf. Process. 8, 347 (2009)., , , and . Quantum Inf. Process., 10 (3): 317-323 (2011)Relativistic quantum private database queries., , and . Quantum Inf. Process., 14 (4): 1443-1450 (2015)Simple hash function using discrete-time quantum walks., , , , , and . Quantum Inf. Process., 17 (8): 189 (2018)Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding., , , and . Inf. Sci., (2014)Deterministic Quantum Secure Direct Communication Protocol Based on Hyper-Entangled State., , , , , and . IEEE Access, (2019)Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability., , , , , , and . Comput. Secur., (2019)Deterministic secure quantum communication based on spatial encoding., , , , , , and . Quantum Inf. Process., 21 (1): 2 (2022)Novel image encryption/decryption based on quantum Fourier transform and double phase encoding., , , and . Quantum Inf. Process., 12 (11): 3477-3493 (2013)