[1] Z. Wu, A. Huang, H. Chen, S. Sun, J. Ding, X. Qiang, X. Fu, P. Xu, and J. Wu, Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination [J]. Opt. Express, 2020, 28: 25574-25590[2] C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing [J]. in Proc. IEEE International Conference on Computers, Systems, and Signal Processing (Bangalore, India), IEEE Press, New York, 1984, pp. 175–179[3] G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, “Limitations on practical quantum cryptography [J]. Phys. Rev. Lett., 2000, 85(6): 1330–1333[4] Feihu Xu, et al., Secure quantum key distribution with realistic devices [J]. Rev. Mod. Phys., 2020, 92: 025002[5] L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination [J]. Nat. Photonics, 2010, 4(10), 686–689[6] Wiechers, Carlos, et al. After-gate attack on a quantum cryptosystem [J]. New Journal of Physics, 2011, 13(1): 013043[7] Weier, Henning, et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors [J]. New Journal of Physics, 2011, 13(7): 0730[8] Lütkenhaus, Norbert. Security against individual attacks for realistic quantum key distribution [J]. Physical Review A, 2000, 61(5): 052304[9] Lydersen, L., Jain, N., Wittmann, C., Mar?y, ?., Skaar, J., Marquardt, C., Leuchs, G. (2011). Superlinear threshold detectors in quantum cryptography [J]. Physical review A, 2011, 84: 032320[10] Calandri N., Sanzaro M., Tosi A., et al. Charge Persistence in InGaAs/InP Single-Photon Avalanche Diodes [J]. IEEE Journal of Quantum Electronics, 2016, 52(3):1-7 |