Practical decoy state for quantum key distribution X Ma, B Qi, Y Zhao, HK Lo Physical Review A 72 (1), 012326, 2005 | 1256 | 2005 |
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems Y Zhao, CHF Fung, B Qi, C Chen, HK Lo Physical Review A 78 (4), 042333, 2008 | 807 | 2008 |
Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems Y Zhao, CHF Fung, B Qi, C Chen, HK Lo arXiv preprint arXiv:0704.3253, 2007 | 807 | 2007 |
Experimental quantum key distribution with decoy states Y Zhao, B Qi, X Ma, HK Lo, L Qian Physical review letters 96 (7), 70502, 2006 | 467 | 2006 |
Quantum key distribution with an unknown and untrusted source Y Zhao, B Qi, HK Lo Physical Review A 77 (5), 052327, 2008 | 149 | 2008 |
Quantum cryptography HK Lo, Y Zhao arXiv preprint arXiv:0803.2507, 2008 | 93 | 2008 |
Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber Y Zhao, B Qi, X Ma, HK Lo, L Qian Information Theory, 2006 IEEE International Symposium on, 2094-2098, 2006 | 78 | 2006 |
Experimental quantum key distribution with active phase randomization Y Zhao, B Qi, HK Lo Applied physics letters 90 (4), 044106-044106-3, 2007 | 75 | 2007 |
Security analysis of an untrusted source for quantum key distribution: passive approach Y Zhao, B Qi, HK Lo, L Qian New Journal of Physics 12 (2), 023024, 2010 | 54 | 2010 |
Quantum key distribution with dual detectors B Qi, Y Zhao, X Ma, HK Lo, L Qian Physical Review A 75 (5), 052304, 2007 | 43 | 2007 |
METHOD, SYSTEM AND APPARATUS FOR OPTICAL PHASE MODULATION BASED ON FREQUENCY SHIFT B Qi, L Qian, HK Lo, Y Zhao US Patent App. 11/565,684, 2006 | 19 | 2006 |
Suppression of extraneous thermal noise in cavity optomechanics Y Zhao, DJ Wilson, KK Ni, HJ Kimble Optics Express 20 (4), 3586-3612, 2012 | 17 | 2012 |
Experimental Decoy State Quantum Key Distribution Over 15km Y Zhao, B Qi, X Ma, HK Lo, L Qian arXiv preprint quant-ph/0503192, 2005 | 11 | 2005 |
Quantum Key Distribution with an Untrusted Source Y Zhao, B Qi, HK Lo International Quantum Electronics Conference, 2009 | 7 | 2009 |
Quantum cryptography in real-life applications: Assumptions and security Y Zhao University of Toronto, 2009 | 7 | 2009 |
Design of synchronous “plug & play” QKD-WDM-PON for efficient quantum communications Y Zhao, M Roetteler, L Xu, T Wang CLEO: Applications and Technology, JThB22, 2011 | 4 | 2011 |
Quantum hacking: attacking practical quantum key distribution systems B Qi, CHF Fung, Y Zhao, X Ma, K Tamaki, C Chen, HK Lo Quantum Communications and Quantum Imaging V 6710, 67100I, 2007 | 2 | 2007 |
Improve the efficiency of a practical quantum key distribution system B Qi, Y Zhao, X Ma, HK Lo, L Qian Proceedings of SPIE, the International Society for Optical Engineering …, 2007 | 1 | 2007 |
Passive Estimate of an Untrusted Source for Quantum Key Distribution Y Zhao, B Qi, HK Lo, L Qian arXiv preprint arXiv:0905.4225, 2009 | | 2009 |
Quantum hacking: attacking practical quantum key distribution systems [6710-18] B Qi, C Fung, Y Zhao, X Ma, K Tamaki, C Chen, H Lo PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING 6710, 6710, 2007 | | 2007 |