-
1
-
-
84880794842
-
Obama to share cybersecurity priorities with congress
-
February 26. Accessed June 26, 2013
-
Engleman E, Robertson J (2013) Obama to share cybersecurity priorities with congress. Blomberg News, February 26. http://www.bloomberg.com/news/2013-02-27/obama-to-share-cybersecurity-priorities-with-congress.html. Accessed June 26, 2013.
-
(2013)
Blomberg News
-
-
Engleman, E.1
Robertson, J.2
-
3
-
-
79960922435
-
Smart Fault Location for Smart Grids
-
Kezunovic M, (2011) Smart Fault Location for Smart Grids. IEEE Trans. Smart Grid 2: 11-22.
-
(2011)
IEEE Trans Smart Grid
, vol.2
, pp. 11-22
-
-
Kezunovic, M.1
-
8
-
-
79959230884
-
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
-
doi:10.1038/ncomms1348, doi
-
Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Kurtsiefer C, Makarov V (2011) Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Communications 2. doi: 10.1038/ncomms1348.
-
(2011)
Nature Communications
, vol.2
-
-
Gerhardt, I.1
Liu, Q.2
Lamas-Linares, A.3
Skaar, J.4
Kurtsiefer, C.5
Makarov, V.6
-
9
-
-
77957566438
-
Hacking commercial quantum cryptography systems by tailored bright illumination
-
doi:10.1038/nphoton.2010.214
-
Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al, (2010) Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 4: 686-689 doi: 10.1038/nphoton.2010.214.
-
(2010)
Nature Photonics
, vol.4
, pp. 686-689
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
-
10
-
-
80054863551
-
Experimentally faking the violation of Bell's inequalities
-
doi:10.1103/PhysRevLett.107.170404
-
Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Scarani V, et al. (2011) Experimentally faking the violation of Bell's inequalities. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.170404.
-
(2011)
Physical Review Letters
, vol.107
-
-
Gerhardt, I.1
Liu, Q.2
Lamas-Linares, A.3
Skaar, J.4
Scarani, V.5
-
11
-
-
44149085575
-
Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
-
Makarov V, Skaar J, (2008) Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Information & Computation 8: 622-635.
-
(2008)
Quantum Information & Computation
, vol.8
, pp. 622-635
-
-
Makarov, V.1
Skaar, J.2
-
12
-
-
79251582193
-
After-gate attack on a quantum cryptosystem
-
doi:10.1088/1367-2630/13/1/013043
-
Wiechers C, Lydersen L, Wittmann C, Elser D, Skaar J, et al. (2011) After-gate attack on a quantum cryptosystem. New Journal of Physics 13. doi: 10.1088/1367-2630/13/1/013043.
-
(2011)
New Journal of Physics
, pp. 13
-
-
Wiechers, C.1
Lydersen, L.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
-
13
-
-
78650558879
-
Thermal blinding of gated detectors in quantum cryptography
-
doi:10.1364/oe.18.027938
-
Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al. (2010) Thermal blinding of gated detectors in quantum cryptography. Optics Express 18: 27938-27954 doi: 10.1364/oe.18.027938.
-
(2010)
Optics Express
, vol.18
, pp. 27938-27954
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
-
14
-
-
80052778927
-
Device calibration impacts security of quantum key distribution
-
doi:10.1103/PhysRevLett.107.11051
-
Jain N, Wittmann C, Lydersen L, Wiechers C, Elser D, et al. (2011) Device calibration impacts security of quantum key distribution. Physical Review Letters 107. doi: 10.1103/PhysRevLett.107.11051.
-
(2011)
Physical Review Letters
, vol.107
-
-
Jain, N.1
Wittmann, C.2
Lydersen, L.3
Wiechers, C.4
Elser, D.5
-
15
-
-
79956134306
-
Tailored bright illumination attack on distributed-phase-reference protocols
-
doi:10.1080/09500340.2011.565889
-
Lydersen L, Skaar J, Makarov V, (2011) Tailored bright illumination attack on distributed-phase-reference protocols. Journal of Modern Optics 58: 680-685 doi: 10.1080/09500340.2011.565889.
-
(2011)
Journal of Modern Optics
, vol.58
, pp. 680-685
-
-
Lydersen, L.1
Skaar, J.2
Makarov, V.3
-
16
-
-
83655181472
-
Controlling a superconducting nanowire single-photon detector using tailored bright illumination
-
doi:10.1088/1367-2630/13/11/113042
-
Lydersen L, Akhlaghi MK, Majedi AH, Skaar J, Makarov V (2011) Controlling a superconducting nanowire single-photon detector using tailored bright illumination. New Journal of Physics 13. doi: 10.1088/1367-2630/13/11/113042.
-
(2011)
New Journal of Physics
, pp. 13
-
-
Lydersen, L.1
Akhlaghi, M.K.2
Majedi, A.H.3
Skaar, J.4
Makarov, V.5
-
17
-
-
79959344336
-
Comment on Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography
-
Applied Physics Letters 99 doi:10.1063/1.3658806 2011
-
Lydersen L, Makarov V, Skaar J (2011) Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography" Appl. Phys. Lett. 98, 231104 (2011). Applied Physics Letters 99. doi: 10.1063/1.3658806.
-
(2011)
Appl. Phys. Lett
, vol.98
, pp. 231104
-
-
Lydersen, L.1
Makarov, V.2
Skaar, J.3
-
18
-
-
80755181033
-
Controlling an actively-quenched single photon detector with bright light
-
Sauge S, Lydersen L, Anisimov A, Skaar J, Makarov V, (2011) Controlling an actively-quenched single photon detector with bright light. Optics Express 19: 23590-23600.
-
(2011)
Optics Express
, vol.19
, pp. 23590-23600
-
-
Sauge, S.1
Lydersen, L.2
Anisimov, A.3
Skaar, J.4
Makarov, V.5
-
19
-
-
80052758414
-
Superlinear threshold detectors in quantum cryptography
-
doi:10.1103/PhysRevA.84.032320
-
Lydersen L, Jain N, Wittmann C, Maroy O, Skaar J, et al. (2011) Superlinear threshold detectors in quantum cryptography. Physical Review A 84. doi: 10.1103/PhysRevA.84.032320.
-
(2011)
Physical Review A
, pp. 84
-
-
Lydersen, L.1
Jain, N.2
Wittmann, C.3
Maroy, O.4
Skaar, J.5
-
20
-
-
78649893991
-
Avoiding the blinding attack in QKD reply
-
doi:10.1038/nphoton.2010.278
-
Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, et al. (2010) Avoiding the blinding attack in QKD reply. Nature Photonics 4: 801-801 doi: 10.1038/nphoton.2010.278.
-
(2010)
Nature Photonics
, vol.4
, pp. 801
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
-
21
-
-
67650035011
-
Controlling passively quenched single photon detectors by bright light
-
doi:10.1088/1367-2630/11/6/065003
-
Makarov V (2009) Controlling passively quenched single photon detectors by bright light. New Journal of Physics 11. doi: 10.1088/1367-2630/11/6/065003.
-
(2009)
New Journal of Physics
, pp. 11
-
-
Makarov, V.1
-
22
-
-
33644682177
-
Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law
-
doi:10.1016/j.physleta.2005.11.062
-
Kish LB, (2006) Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law. Physics Letters A 352: 178-182 doi: 10.1016/j.physleta.2005.11.062.
-
(2006)
Physics Letters A
, vol.352
, pp. 178-182
-
-
Kish, L.B.1
-
23
-
-
33344454992
-
Protection against the man-in the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security
-
doi:10.1142/s0219477506003148
-
Kish LB, (2006) Protection against the man-in the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security. Fluctuation and Noise Letters 6: L57-L63 doi: 10.1142/s0219477506003148.
-
(2006)
Fluctuation and Noise Letters
, vol.6
-
-
Kish, L.B.1
-
24
-
-
84875123871
-
-
(open access)
-
Mingesz R, Kish LB, Gingl Z, Granqvist CG, Wen H, et al. (2013) Unconditional security by the laws of classical physics. Metrology and Measurement Systems 20:3-16; (open access) http://www.metrology.pg.gda.pl/full/2013/M&MS_2013_003.pdf.
-
(2013)
Unconditional security by the laws of classical physics. Metrology and Measurement Systems
, vol.20
, pp. 3-16
-
-
Mingesz, R.1
Kish, L.B.2
Gingl, Z.3
Granqvist, C.G.4
Wen, H.5
-
25
-
-
38649120100
-
Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line
-
doi:10.1016/j.physleta.2007.67.086
-
Mingesz R, Gingl Z, Kish LB, (2008) Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Physics Letters A 372: 978-984 doi: 10.1016/j.physleta.2007.67.086.
-
(2008)
Physics Letters A
, vol.372
, pp. 978-984
-
-
Mingesz, R.1
Gingl, Z.2
Kish, L.B.3
-
26
-
-
46349098647
-
Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives
-
doi:10.1142/s0219477508004362
-
Kish LB, Saidi O, (2008) Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives. Fluctuation and Noise Letters 8: L95-L98 doi: 10.1142/s0219477508004362.
-
(2008)
Fluctuation and Noise Letters
, vol.8
-
-
Kish, L.B.1
Saidi, O.2
-
27
-
-
84860630671
-
Information networks secured by the laws of physics
-
doi:10.1587/transcom.E95.B.1501
-
Kish LB, Peper F, (2012) Information networks secured by the laws of physics. Ieice Transactions on Communications. E95B: 1501-1507 doi: 10.1587/transcom.E95.B.1501.
-
(2012)
Ieice Transactions on Communications
, vol.E95B
, pp. 1501-1507
-
-
Kish, L.B.1
Peper, F.2
-
28
-
-
33646492618
-
Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise
-
doi:10.1142/s0219477506003628
-
Kish LB, Mingez R, (2006) Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise. Fluctuation and noise letters 6: L447-L447 doi: 10.1142/s0219477506003628.
-
(2006)
Fluctuation and Noise Letters
, vol.6
-
-
Kish, L.B.1
Mingez, R.2
-
31
-
-
84878382625
-
Enhanced secure key exchange systems based on the Johnson-noise scheme
-
Kish LB, (2013) Enhanced secure key exchange systems based on the Johnson-noise scheme. Metrology & Measurement Systems XX: 191-204 Available: http://www.degruyter.com/view/j/mms.2013.20.issue-2/mms-2013-0017/mms-2013-0017.xml?format=INT.
-
(2013)
Metrology & Measurement Systems
, vol.XX
, pp. 191-204
-
-
Kish, L.B.1
|