Henrich, JohannaWendzel, SteffenWressnegger, ChristianHartmann, LauraFreiling, FelixArmknecht, FrederikReinfelder, Lena2024-04-192024-04-192024978-3-88579-739-5https://dl.gi.de/handle/20.500.12116/43965enWays for confidential and authenticated hop-by-hop key establishment in QKDNText/Conference Paper10.18420/sicherheit2024_0241617-5468