2. Quantum hacking. |
2.1. Passive attacks and active attacks.
2.2. Hacking the transmitters. Attacks using Trojan Horses.
23. Hacking the receivers. Attacks on detectors.
2.4. Security of experimental implementations. |
4. Quantum key distribution networks. |
4.1. Network architectures. Networks based on trusted nodes and satellite networks.
4.2. Compatibility with optical communication networks.
4.3. Standardization and certification. |