Invisible Trojan-horse attack
Abstract We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack perform...
Saved in:
Main Authors: | , , , |
---|---|
Format: | article |
Language: | EN |
Published: |
Nature Portfolio
2017
|
Subjects: | |
Online Access: | https://doaj.org/article/24b1b175064541328a6c4967e78d5d01 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|