Quantum 9, 1937 (2025). https://doi.org/10.22331/q-2025-12-11-1937 We present a finite-size security proof of the decoy-state BB84 QKD protocol against coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this result to the case of […]

Recent Comments