Laser Damage Helps the Eavesdropper in Quantum Cryptography
|
journal
|
February 2014 |
Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution
|
journal
|
May 2015 |
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw
|
journal
|
April 2012 |
Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances
|
journal
|
March 1999 |
Device Calibration Impacts Security of Quantum Key Distribution
|
journal
|
September 2011 |
Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution
|
journal
|
June 2013 |
High-rate measurement-device-independent quantum cryptography
|
journal
|
May 2015 |
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
|
journal
|
November 2013 |
Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol
|
journal
|
June 2014 |
Quantum key distribution with an unknown and untrusted source
|
journal
|
May 2008 |
Statistical fluctuation analysis for measurement-device-independent quantum key distribution
|
journal
|
November 2012 |
Probability Inequalities for Sums of Bounded Random Variables
|
journal
|
March 1963 |
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
|
journal
|
July 2000 |
Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors
|
journal
|
January 2013 |
Continuous-variable measurement-device-independent quantum key distribution
|
journal
|
May 2014 |
General theory of decoy-state quantum cryptography with source errors
|
journal
|
April 2008 |
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
|
journal
|
October 2008 |
Composability in quantum cryptography
|
journal
|
August 2009 |
Weighted sums of certain dependent random variables
|
journal
|
January 1967 |
Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration
|
journal
|
February 2015 |
Concise security bounds for practical decoy-state quantum key distribution
|
journal
|
February 2014 |
Provably secure and practical quantum key distribution over 307 km of optical fibre
|
journal
|
February 2015 |
Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication
|
journal
|
August 2005 |
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
|
journal
|
May 2014 |
Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
|
journal
|
September 2012 |
The Universal Composable Security of Quantum Key Distribution
|
book
|
January 2005 |
Simple security proof of quantum key distribution based on complementarity
|
journal
|
April 2009 |
Quantum Key Distribution with High Loss: Toward Global Secure Communication
|
journal
|
August 2003 |
Reexamination of the decoy-state quantum key distribution with an unstable source
|
journal
|
July 2010 |
Passive-scheme analysis for solving the untrusted source problem in quantum key distribution
|
journal
|
April 2010 |
Hacking commercial quantum cryptography systems by tailored bright illumination
|
journal
|
August 2010 |
Experimental quantum-key distribution with an untrusted source
|
journal
|
January 2008 |
Unconditional Security of a Three State Quantum Key Distribution Protocol
|
journal
|
January 2005 |
Decoy State Quantum Key Distribution
|
journal
|
June 2005 |
Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography
|
journal
|
June 2005 |
Tight finite-key analysis for quantum cryptography
|
journal
|
January 2012 |
Security analysis of an untrusted source for quantum key distribution: passive approach
|
journal
|
February 2010 |
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
|
journal
|
July 2011 |
Long distance measurement-device-independent quantum key distribution with entangled photon sources
|
journal
|
August 2013 |
A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
|
journal
|
December 1952 |
Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
|
journal
|
September 2013 |
Loss-tolerant quantum cryptography with imperfect sources
|
journal
|
November 2014 |
Experimental Measurement-Device-Independent Quantum Key Distribution
|
journal
|
September 2013 |
Quantum cryptography
|
journal
|
March 2002 |
Secure quantum key distribution
|
journal
|
July 2014 |
Measurement-Device-Independent Quantum Key Distribution
|
journal
|
March 2012 |
The security of practical quantum key distribution
|
journal
|
September 2009 |
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
|
journal
|
June 2014 |
Finite-key analysis for measurement-device-independent quantum key distribution
|
journal
|
April 2014 |
Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse
|
journal
|
September 2009 |
Security of quantum key distribution with imperfect devices
|
journal
|
September 2004 |