-
1
-
-
0036013605
-
Quantum cryptography
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74(1), 145-195 (2002).
-
(2002)
Rev. Mod. Phys.
, vol.74
, Issue.1
, pp. 145-195
-
-
Gisin, N.1
Ribordy, G.2
Tittel, W.3
Zbinden, H.4
-
2
-
-
0033605546
-
Unconditional security of quantum key distribution over arbitrarily long distances
-
H.-K. Lo and H. F. Chau, "Unconditional security of quantum key distribution over arbitrarily long distances," Science 283(5410), 2050-2056 (1999).
-
(1999)
Science
, vol.283
, Issue.5410
, pp. 2050-2056
-
-
Lo, H.-K.1
Chau, H.F.2
-
3
-
-
70449402318
-
The security of practical quantum key distribution
-
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, "The security of practical quantum key distribution," Rev. Mod. Phys. 81(3), 1301-1350 (2009).
-
(2009)
Rev. Mod. Phys.
, vol.81
, Issue.3
, pp. 1301-1350
-
-
Scarani, V.1
Bechmann-Pasquinucci, H.2
Cerf, N.J.3
Dušek, M.4
Lütkenhaus, N.5
Peev, M.6
-
4
-
-
7044249607
-
Security of quantum key distribution with imperfect devices
-
D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," Quantum Inf. Comput. 4, 325-360 (2004).
-
(2004)
Quantum Inf. Comput
, vol.4
, pp. 325-360
-
-
Gottesman, D.1
Lo, H.-K.2
Lütkenhaus, N.3
Preskill, J.4
-
5
-
-
0035841898
-
Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
-
S. Felix, N. Gisin, A. Stefanov, and H. Zbinden, "Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses," J. Mod. Opt. 48, 2009-2021 (2001).
-
(2001)
J. Mod. Opt
, vol.48
, pp. 2009-2021
-
-
Felix, S.1
Gisin, N.2
Stefanov, A.3
Zbinden, H.4
-
6
-
-
79961093424
-
Passive Faraday-mirror attack in a practical two-way quantum- keydistribution system
-
S.-H. Sun, M.-S. Jiang, and L.-M. Liang, "Passive Faraday-mirror attack in a practical two-way quantum-keydistribution system," Phys. Rev. A 83(6), 062331 (2011).
-
(2011)
Phys. Rev. A
, vol.83
, Issue.6
, pp. 062331
-
-
Sun, S.-H.1
Jiang, M.-S.2
Liang, L.-M.3
-
7
-
-
33646373811
-
Trojan-horse attacks on quantum-key-distribution systems
-
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, "Trojan-horse attacks on quantum-key-distribution systems," Phys. Rev. A 73(2), 022320 (2006).
-
(2006)
Phys. Rev. A
, vol.73
, Issue.2
, pp. 022320
-
-
Gisin, N.1
Fasel, S.2
Kraus, B.3
Zbinden, H.4
Ribordy, G.5
-
8
-
-
33947205243
-
Phase-remapping attack in practical quantum-key-distribution systems
-
C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, "Phase-remapping attack in practical quantum-key-distribution systems," Phys. Rev. A 75(3), 032314 (2007).
-
(2007)
Phys. Rev. A
, vol.75
, Issue.3
, pp. 032314
-
-
Fung, C.-H.F.1
Qi, B.2
Tamaki, K.3
Lo, H.-K.4
-
9
-
-
78650161554
-
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
-
F. Xu, B. Qi, and H.-K. Lo, "Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," New J. Phys. 12(11), 113026 (2010).
-
(2010)
New J. Phys.
, vol.12
, Issue.11
, pp. 113026
-
-
Xu, F.1
Qi, B.2
Lo, H.-K.3
-
10
-
-
33846365694
-
Effects of detector efficiency mismatch on security of quantum cryptosystems
-
V. Makarov, A. Anisimov, and A. Skaar, "Effects of detector efficiency mismatch on security of quantum cryptosystems," Phys. Rev. A 74(2), 022313 (2006).
-
(2006)
Phys. Rev. A
, vol.74
, Issue.2
, pp. 022313
-
-
Makarov, V.1
Anisimov, A.2
Skaar, A.3
-
11
-
-
33846202211
-
Time-shift attack in practical quantum cryptosystem
-
B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, "Time-shift attack in practical quantum cryptosystem," Quantum Inf. Comput. 7, 073-082 (2007).
-
(2007)
Quantum Inf. Comput
, vol.7
, pp. 073-082
-
-
Qi, B.1
Fung, C.-H.F.2
Lo, H.-K.3
Ma, X.4
-
12
-
-
55049100546
-
Quantum hacking: Experimental demonstration of timeshift attack against practical quantum-key-distribution systems
-
Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, "Quantum hacking: Experimental demonstration of timeshift attack against practical quantum-key-distribution systems," Phys. Rev. A 78(4), 042333 (2008).
-
(2008)
Phys. Rev. A
, vol.78
, Issue.4
, pp. 042333
-
-
Zhao, Y.1
Fung, C.-H.F.2
Qi, B.3
Chen, C.4
Lo, H.-K.5
-
13
-
-
80052778927
-
Device calibration impacts security of quantum key distribution
-
N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, C. Marquardt, V. Makarov, and G. Leuchs, "Device calibration impacts security of quantum key distribution," Phys. Rev. Lett. 107(11), 110501 (2011).
-
(2011)
Phys. Rev. Lett.
, vol.107
, Issue.11
, pp. 110501
-
-
Jain, N.1
Wittmann, C.2
Lydersen, L.3
Wiechers, C.4
Elser, D.5
Marquardt, C.6
Makarov, V.7
Leuchs, G.8
-
14
-
-
67650035011
-
Controlling passively quenched single photon detectors by bright light
-
V. Makarov, "Controlling passively quenched single photon detectors by bright light," New J. Phys. 11(6), 065003 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.6
, pp. 065003
-
-
Makarov, V.1
-
15
-
-
80755181033
-
Controlling an actively-quenched single photon detector with bright light
-
S. Sauge, L. Lydersen, A. Anisimov, J. Skaar, and V. Makarov, "Controlling an actively-quenched single photon detector with bright light," Opt. Express 19(23), 23590-23600 (2011).
-
(2011)
Opt. Express
, vol.19
, Issue.23
, pp. 23590-23600
-
-
Sauge, S.1
Lydersen, L.2
Anisimov, A.3
Skaar, J.4
Makarov, V.5
-
16
-
-
79251582193
-
Aftergate attack on a quantum cryptosystem
-
C. Wiechers, L. Lydersen, C. Wittmann, D. Elser, J. Skaar, C. Marquardt, V. Makarov, and G. Leuchs, "Aftergate attack on a quantum cryptosystem," New J. Phys. 13(1), 013043 (2011).
-
(2011)
New J. Phys.
, vol.13
, Issue.1
, pp. 013043
-
-
Wiechers, C.1
Lydersen, L.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
Marquardt, C.6
Makarov, V.7
Leuchs, G.8
-
17
-
-
78650558879
-
Thermal blinding of gated detectors in quantum cryptography
-
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Thermal blinding of gated detectors in quantum cryptography," Opt. Express 18(26), 27938-27954 (2010).
-
(2010)
Opt. Express
, vol.18
, Issue.26
, pp. 27938-27954
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
Makarov, V.6
-
18
-
-
27844566291
-
Faked states attack on quantum cryptosystems
-
V. Makarov and D. R. Hjelme, "Faked states attack on quantum cryptosystems," J. Mod. Opt. 52, 691-705 (2005).
-
(2005)
J. Mod. Opt
, vol.52
, pp. 691-705
-
-
Makarov, V.1
Hjelme, D.R.2
-
19
-
-
79960775427
-
Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors
-
H. Weier, H. Krauss, M. Rau, M. Fürst, S. Nauerth, and H. Weinfurter, "Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors," New J. Phys. 13(7), 073024 (2011).
-
(2011)
New J. Phys.
, vol.13
, Issue.7
, pp. 073024
-
-
Weier, H.1
Krauss, H.2
Rau, M.3
Fürst, M.4
Nauerth, S.5
Weinfurter, H.6
-
20
-
-
77957566438
-
Hacking commercial quantum cryptography systems by tailored bright illumination
-
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, "Hacking commercial quantum cryptography systems by tailored bright illumination," Nat. Photonics 4(10), 686-689 (2010).
-
(2010)
Nat. Photonics
, vol.4
, Issue.10
, pp. 686-689
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
Makarov, V.6
-
21
-
-
79959230884
-
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
-
I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, C. Kurtsiefer, and V. Makarov, "Full-field implementation of a perfect eavesdropper on a quantum cryptography system," Nat. Commun. 2, 349 (2011).
-
(2011)
Nat. Commun
, vol.2
, pp. 349
-
-
Gerhardt, I.1
Liu, Q.2
Lamas-Linares, A.3
Skaar, J.4
Kurtsiefer, C.5
Makarov, V.6
-
22
-
-
80054863551
-
Experimentally faking the violation of bell's inequalities
-
I. Gerhardt, Q. Liu, A. Lamas-Linares, J. Skaar, V. Scarani, V. Makarov, and C. Kurtsiefer, "Experimentally Faking the Violation of Bell's Inequalities," Phys. Rev. Lett. 107(17), 170404 (2011).
-
(2011)
Phys. Rev. Lett.
, vol.107
, Issue.17
, pp. 170404
-
-
Gerhardt, I.1
Liu, Q.2
Lamas-Linares, A.3
Skaar, J.4
Scarani, V.5
Makarov, V.6
Kurtsiefer, C.7
-
23
-
-
78649831321
-
Avoiding the blinding attack in QKD
-
Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Avoiding the blinding attack in QKD," Nat. Photonics 4(12), 800- 801 (2010).
-
(2010)
Nat. Photonics
, vol.4
, Issue.12
, pp. 800-801
-
-
Yuan, Z.L.1
Dynes, J.F.2
Shields, A.J.3
-
24
-
-
79959344336
-
Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography
-
Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography," Appl. Phys. Lett. 98(23), 231104 (2011).
-
(2011)
Appl. Phys. Lett.
, vol.98
, Issue.23
, pp. 231104
-
-
Yuan, Z.L.1
Dynes, J.F.2
Shields, A.J.3
-
25
-
-
81155144563
-
Comment on "resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography [App. Phys. Lett. 98, 231104 (2011)]
-
L. Lydersen, V. Makarov, and J. Skaar, "Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography" [App. Phys. Lett. 98, 231104 (2011)]," Appl. Phys. Lett. 99(19), 196101 (2011).
-
(2011)
Appl. Phys. Lett.
, vol.99
, Issue.19
, pp. 196101
-
-
Lydersen, L.1
Makarov, V.2
Skaar, J.3
-
26
-
-
81155145934
-
Response to "comment on "resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography" " [Appl. Phys. Lett 99 196101 (2011)]
-
Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Response to "Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"" [Appl. Phys. Lett 99 196101 (2011)]," Appl. Phys. Lett. 99(19), 196102 (2011).
-
(2011)
Appl. Phys. Lett.
, vol.99
, Issue.19
, pp. 196102
-
-
Yuan, Z.L.1
Dynes, J.F.2
Shields, A.J.3
-
27
-
-
79952605387
-
Secure gated detection scheme for quantum cryptography
-
L. Lydersen, V. Makarov, and J. Skaar, "Secure gated detection scheme for quantum cryptography," Phys. Rev. A 83(3), 032306 (2011).
-
(2011)
Phys. Rev. A
, vol.83
, Issue.3
, pp. 032306
-
-
Lydersen, L.1
Makarov, V.2
Skaar, J.3
-
28
-
-
84859361763
-
Measurement-device-independent quantum key distribution
-
H.-K. Lo, M. Curty, and B. Qi, "Measurement-device-independent quantum key distribution," Phys. Rev. Lett. 108(13), 130503 (2012).
-
(2012)
Phys. Rev. Lett.
, vol.108
, Issue.13
, pp. 130503
-
-
Lo, H.-K.1
Curty, M.2
Qi, B.3
-
29
-
-
80051886736
-
Real-time characterization of gated-mode single-photon detectors
-
T. F. da Silva, G. B. Xavier, and J. P. von der Weid, "Real-time characterization of gated-mode single-photon detectors," IEEE J. Quantum Electron. 47(9), 1251-1256 (2011).
-
(2011)
IEEE J. Quantum Electron.
, vol.47
, Issue.9
, pp. 1251-1256
-
-
Da Silva, T.F.1
Xavier, G.B.2
Weid Der Von, J.P.3
-
30
-
-
80052758414
-
Superlinear threshold detectors in quantum cryptography
-
L. Lydersen, N. Jain, C. Wittmann, O. Maroy, J. Skaar, C. Marquardt, V. Makarov, and G. Leuchs, "Superlinear threshold detectors in quantum cryptography," Phys. Rev. A 84(3), 032320 (2011).
-
(2011)
Phys. Rev. A
, vol.84
, Issue.3
, pp. 032320
-
-
Lydersen, L.1
Jain, N.2
Wittmann, C.3
Maroy, O.4
Skaar, J.5
Marquardt, C.6
Makarov, V.7
Leuchs, G.8
-
31
-
-
72449202040
-
Single-photon detectors for optical quantum information applications
-
R. H. Hadfield, "Single-photon detectors for optical quantum information applications," Nat. Photonics 3(12), 696-705 (2009).
-
(2009)
Nat. Photonics
, vol.3
, Issue.12
, pp. 696-705
-
-
Hadfield, R.H.1
-
32
-
-
79961144446
-
Invited review article: Single-photon sources and detectors
-
M. D. Eisaman, J. Fan, A. Migdall, and S. V. Polyakov, "Invited review article: single-photon sources and detectors," Rev. Sci. Instrum. 82(7), 071101 (2011).
-
(2011)
Rev. Sci. Instrum.
, vol.82
, Issue.7
, pp. 071101
-
-
Eisaman, M.D.1
Fan, J.2
Migdall, A.3
Polyakov, S.V.4
-
33
-
-
67249092509
-
Comprehensive characterization of InGaAs-InP avalanche photodiodes at 1550 nm with an active quenching ASIC
-
J. Zhang, R. Thew, J. D. Gautier, N. Gisin, and H. Zbinden, "Comprehensive characterization of InGaAs-InP avalanche photodiodes at 1550 nm with an active quenching ASIC," IEEE J. Quantum Electron. 45(7), 792-799 (2009).
-
(2009)
IEEE J. Quantum Electron.
, vol.45
, Issue.7
, pp. 792-799
-
-
Zhang, J.1
Thew, R.2
Gautier, J.D.3
Gisin, N.4
Zbinden, H.5
-
34
-
-
0037038591
-
Quantum efficiency evaluation method for gated-mode single-photon detector
-
A. Yoshizawa, R. Kaji, and H. Tsuchida, "Quantum efficiency evaluation method for gated-mode single-photon detector," Electron. Lett. 38(23), 1468-1469 (2002).
-
(2002)
Electron. Lett.
, vol.38
, Issue.23
, pp. 1468-1469
-
-
Yoshizawa, A.1
Kaji, R.2
Tsuchida, H.3
-
35
-
-
0030121167
-
Avalanche photodiodes and quenching circuits for single-photon detection
-
S. Cova, M. Ghioni, A. Lacaita, C. Samori, and F. Zappa, "Avalanche photodiodes and quenching circuits for single-photon detection," Appl. Opt. 35(12), 1956-1976 (1996).
-
(1996)
Appl. Opt.
, vol.35
, Issue.12
, pp. 1956-1976
-
-
Cova, S.1
Ghioni, M.2
Lacaita, A.3
Samori, C.4
Zappa, F.5
-
36
-
-
66449117639
-
Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation
-
G. B. Xavier, N. Walenta, G. Vilela de Faria, G. P. Temporão, N. Gisin, H. Zbinden, and J. P. von der Weid, "Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation," New J. Phys. 11(4), 045015 (2009).
-
(2009)
New J. Phys.
, vol.11
, Issue.4
, pp. 045015
-
-
Xavier, G.B.1
Walenta, N.2
De Vilela, F.G.3
Temporão, G.P.4
Gisin, N.5
Zbinden, H.6
Weid Der Von, J.P.7
-
37
-
-
3142589119
-
Evolution and prospects for single-photon avalanche diodes and quenching circuits
-
S. Cova, M. Ghioni, A. Lotito, I. Rech, and F. Zappa, "Evolution and prospects for single-photon avalanche diodes and quenching circuits," J. Mod. Opt. 51, 1267-1288 (2004).
-
(2004)
J. Mod. Opt
, vol.51
, pp. 1267-1288
-
-
Cova, S.1
Ghioni, M.2
Lotito, A.3
Rech, I.4
Zappa, F.5
-
38
-
-
0001155383
-
Quantum random-number generation and key sharing
-
J. G. Rarity, P. C. M. Owens, and P. R. Tapster, "Quantum random-number generation and key sharing," J. Mod. Opt. 41(12), 2435-2444 (1994).
-
(1994)
J. Mod. Opt.
, vol.41
, Issue.12
, pp. 2435-2444
-
-
Rarity, J.G.1
Owens, P.C.M.2
Tapster, P.R.3
-
39
-
-
84864134351
-
Stability of high bit rate quantum key distribution on installed fiber
-
J. F. Dynes, I. Choi, A. W. Sharpe, A. R. Dixon, Z. L. Yuan, M. Fujiwara, M. Sasaki, and A. J. Shields, "Stability of high bit rate quantum key distribution on installed fiber," Opt. Express 20(15), 16339-16347 (2012).
-
(2012)
Opt. Express
, vol.20
, Issue.15
, pp. 16339-16347
-
-
Dynes, J.F.1
Choi, I.2
Sharpe, A.W.3
Dixon, A.R.4
Yuan, Z.L.5
Fujiwara, M.6
Sasaki, M.7
Shields, A.J.8
|