关注
Hoi-Kwong Lo
Hoi-Kwong Lo
在 comm.utoronto.ca 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Decoy State Quantum Key Distribution
HK Lo, X Ma, K Chen
Physical Review Letters 94 (23), 230504, 2005
24902005
Measurement-device-independent quantum key distribution
HK Lo, M Curty, B Qi
Physical review letters 108 (13), 130503, 2012
21552012
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau
science 283 (5410), 2050-2056, 1999
20291999
How to share a quantum secret
R Cleve, D Gottesman, HK Lo
Physical review letters 83 (3), 648, 1999
15411999
Security of quantum key distribution with imperfect devices
D Gottesman, HK Lo, N Lutkenhaus, J Preskill
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004
13122004
Secure quantum key distribution
HK Lo, M Curty, K Tamaki
Nature Photonics 8 (8), 595-604, 2014
12262014
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 72 (1), 012326, 2005
11722005
Secure quantum key distribution with realistic devices
F Xu, X Ma, Q Zhang, HK Lo, JW Pan
Reviews of modern physics 92 (2), 025002, 2020
10742020
Is quantum bit commitment really possible?
HK Lo, HF Chau
Physical Review Letters 78 (17), 3410, 1997
7881997
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 78 (4), 042333, 2008
7672008
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity
HK Lo
Physical Review A 62 (1), 012313, 2000
7412000
Practical challenges in quantum key distribution
E Diamanti, HK Lo, B Qi, Z Yuan
npj Quantum Information 2 (1), 1-12, 2016
6772016
Efficient quantum key distribution scheme and a proof of its unconditional security
HK Lo, HF Chau, M Ardehali
Journal of Cryptology 18, 133-165, 2005
6332005
All-photonic quantum repeaters
K Azuma, K Tamaki, HK Lo
Nature communications 6 (1), 1-7, 2015
5922015
Introduction to quantum computation and information
HK Lo, T Spiller, S Popescu
World Scientific, 1998
5561998
Insecurity of quantum secure computations
HK Lo
Physical Review A 56 (2), 1154, 1997
5321997
Time-shift attack in practical quantum cryptosystems
B Qi, CHF Fung, HK Lo, X Ma
arXiv preprint quant-ph/0512080, 2005
4832005
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 070502, 2006
4472006
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo
IEEE Transactions on Information Theory 49 (2), 457-475, 2003
4202003
Finite-key analysis for measurement-device-independent quantum key distribution
M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo
Nature communications 5 (1), 3732, 2014
4112014
系统目前无法执行此操作,请稍后再试。
文章 1–20