Research Article
Optimization and Implementation of Efficient and Universal Quantum Key Distribution
Figure 9
Key sensitivity evaluation. (a) The cipher image. (b) The image decrypted with the correct keys. (c) The image decrypted with a slightly different key.
(a) |
(b) |
(c) |