Figure 5From: Automated verification of countermeasure against detector-control attack in quantum key distributionReport generated by software after automated test of cw blinding and control. The multiple curves in the third and fifth plots are taken at cw power values shown in the fourth plot. See text for detailsBack to article page