Follow
Hoi-Kwong Lo
Title
Cited by
Cited by
Year
Decoy State Quantum Key Distribution
HK Lo, X Ma, K Chen
Physical Review Letters 94 (23), 230504, 2005
26702005
Measurement-device-independent quantum key distribution
HK Lo, M Curty, B Qi
Physical review letters 108 (13), 130503, 2012
23502012
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau
science 283 (5410), 2050-2056, 1999
21031999
How to share a quantum secret
R Cleve, D Gottesman, HK Lo
Physical review letters 83 (3), 648, 1999
15861999
Security of quantum key distribution with imperfect devices
D Gottesman, HK Lo, N Lutkenhaus, J Preskill
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004
13642004
Secure quantum key distribution
HK Lo, M Curty, K Tamaki
Nature Photonics 8 (8), 595-604, 2014
13462014
Secure quantum key distribution with realistic devices
F Xu, X Ma, Q Zhang, HK Lo, JW Pan
Reviews of modern physics 92 (2), 025002, 2020
12932020
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 72 (1), 012326, 2005
12472005
Is quantum bit commitment really possible?
HK Lo, HF Chau
Physical Review Letters 78 (17), 3410, 1997
8171997
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 78 (4), 042333, 2008
7992008
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity
HK Lo
Physical Review A 62 (1), 012313, 2000
7652000
Practical challenges in quantum key distribution
E Diamanti, HK Lo, B Qi, Z Yuan
npj Quantum Information 2 (1), 1-12, 2016
7472016
All-photonic quantum repeaters
K Azuma, K Tamaki, HK Lo
Nature communications 6 (1), 1-7, 2015
6652015
Efficient quantum key distribution scheme and a proof of its unconditional security
HK Lo, HF Chau, M Ardehali
Journal of Cryptology 18, 133-165, 2005
6582005
Introduction to quantum computation and information
HK Lo, T Spiller, S Popescu
World Scientific, 1998
5691998
Insecurity of quantum secure computations
HK Lo
Physical Review A 56 (2), 1154, 1997
5661997
Time-shift attack in practical quantum cryptosystems
B Qi, CHF Fung, HK Lo, X Ma
arXiv preprint quant-ph/0512080, 2005
5072005
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 070502, 2006
4622006
Finite-key analysis for measurement-device-independent quantum key distribution
M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo
Nature communications 5 (1), 3732, 2014
4352014
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo
IEEE Transactions on Information Theory 49 (2), 457-475, 2003
4342003
The system can't perform the operation now. Try again later.
Articles 1–20