Folgen
Hoi-Kwong Lo
Hoi-Kwong Lo
Bestätigte E-Mail-Adresse bei comm.utoronto.ca - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Decoy State Quantum Key Distribution
HK Lo, X Ma, K Chen
Physical Review Letters 94 (23), 230504, 2005
26782005
Measurement-device-independent quantum key distribution
HK Lo, M Curty, B Qi
Physical review letters 108 (13), 130503, 2012
23652012
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau
science 283 (5410), 2050-2056, 1999
21111999
How to share a quantum secret
R Cleve, D Gottesman, HK Lo
Physical review letters 83 (3), 648, 1999
15881999
Security of quantum key distribution with imperfect devices
D Gottesman, HK Lo, N Lutkenhaus, J Preskill
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004
13672004
Secure quantum key distribution
HK Lo, M Curty, K Tamaki
Nature Photonics 8 (8), 595-604, 2014
13542014
Secure quantum key distribution with realistic devices
F Xu, X Ma, Q Zhang, HK Lo, JW Pan
Reviews of modern physics 92 (2), 025002, 2020
13092020
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 72 (1), 012326, 2005
12512005
Is quantum bit commitment really possible?
HK Lo, HF Chau
Physical Review Letters 78 (17), 3410, 1997
8161997
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 78 (4), 042333, 2008
8002008
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity
HK Lo
Physical Review A 62 (1), 012313, 2000
7662000
Practical challenges in quantum key distribution
E Diamanti, HK Lo, B Qi, Z Yuan
npj Quantum Information 2 (1), 1-12, 2016
7522016
All-photonic quantum repeaters
K Azuma, K Tamaki, HK Lo
Nature communications 6 (1), 1-7, 2015
6692015
Efficient quantum key distribution scheme and a proof of its unconditional security
HK Lo, HF Chau, M Ardehali
Journal of Cryptology 18, 133-165, 2005
6582005
Introduction to quantum computation and information
HK Lo, T Spiller, S Popescu
World Scientific, 1998
5691998
Insecurity of quantum secure computations
HK Lo
Physical Review A 56 (2), 1154, 1997
5661997
Time-shift attack in practical quantum cryptosystems
B Qi, CHF Fung, HK Lo, X Ma
arXiv preprint quant-ph/0512080, 2005
5072005
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 070502, 2006
4632006
Finite-key analysis for measurement-device-independent quantum key distribution
M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo
Nature communications 5 (1), 3732, 2014
4382014
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo
IEEE Transactions on Information Theory 49 (2), 457-475, 2003
4352003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20