Extended Data Table 3 Typical quantum attacks and our countermeasures

From: Entanglement-based secure quantum cryptography over 1,120 kilometres

  1. Data are from refs. 26,27,28,29,30,37,38,39,40.