Related references
Note: Only part of the references are listed.Concise security bounds for practical decoy-state quantum key distribution
Charles Ci Wen Lim et al.
PHYSICAL REVIEW A (2014)
Chain Rules for Smooth Min- and Max-Entropies
Alexander Vitanov et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2013)
Detecting single infrared photons with 93% system efficiency
F. Marsili et al.
NATURE PHOTONICS (2013)
Practical aspects of measurement-device-independent quantum key distribution
Feihu Xu et al.
NEW JOURNAL OF PHYSICS (2013)
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
T. Ferreira da Silva et al.
PHYSICAL REVIEW A (2013)
Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
A. Rubenok et al.
PHYSICAL REVIEW LETTERS (2013)
Memory Attacks on Device-Independent Quantum Cryptography
Jonathan Barrett et al.
PHYSICAL REVIEW LETTERS (2013)
Experimental Measurement-Device-Independent Quantum Key Distribution
Yang Liu et al.
PHYSICAL REVIEW LETTERS (2013)
Experimental quantum key distribution with finite-key security analysis for noisy channels
Davide Bacco et al.
NATURE COMMUNICATIONS (2013)
Finite-key analysis for measurement-device-independent quantum key distribution
Ting-Ting Song et al.
PHYSICAL REVIEW A (2012)
Statistical fluctuation analysis for measurement-device-independent quantum key distribution
Xiongfeng Ma et al.
PHYSICAL REVIEW A (2012)
Measurement-Device-Independent Quantum Key Distribution
Hoi-Kwong Lo et al.
PHYSICAL REVIEW LETTERS (2012)
Tight finite-key analysis for quantum cryptography
Marco Tomamichel et al.
NATURE COMMUNICATIONS (2012)
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
Henning Weier et al.
NEW JOURNAL OF PHYSICS (2011)
Heralded-qubit amplifiers for practical device-independent quantum key distribution
Marcos Curty et al.
PHYSICAL REVIEW A (2011)
Secure device-independent quantum key distribution with causally independent measurement devices
Lluis Masanes et al.
NATURE COMMUNICATIONS (2011)
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Ilja Gerhardt et al.
NATURE COMMUNICATIONS (2011)
Duality Between Smooth Min- and Max-Entropies
Marco Tomamichel et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2010)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Feihu Xu et al.
NEW JOURNAL OF PHYSICS (2010)
Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier
Nicolas Gisin et al.
PHYSICAL REVIEW LETTERS (2010)
Single-photon detectors for optical quantum information applications
Robert H. Hadfield
NATURE PHOTONICS (2009)
Device-independent quantum key distribution secure against collective attacks
Stefano Pironio et al.
NEW JOURNAL OF PHYSICS (2009)
Composability in quantum cryptography
Joern Mueller-Quade et al.
NEW JOURNAL OF PHYSICS (2009)
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Matthew McKague
NEW JOURNAL OF PHYSICS (2009)
Information leakage via side channels in freespace BB84 quantum cryptography
Sebastian Nauerth et al.
NEW JOURNAL OF PHYSICS (2009)
The security of practical quantum key distribution
Valerio Scarani et al.
REVIEWS OF MODERN PHYSICS (2009)
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Breaking a quantum key distribution system through a timing side channel
Antia Lamas-Linares et al.
OPTICS EXPRESS (2007)
Entanglement-based quantum communication over 144km
R. Ursin et al.
NATURE PHYSICS (2007)
Device-independent security of quantum cryptography against collective attacks
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2007)
Phase-remapping attack in practical quantum-key-distribution systems
Chi-Hang Fred Fung et al.
PHYSICAL REVIEW A (2007)
Decoy state quantum key distribution
HK Lo et al.
PHYSICAL REVIEW LETTERS (2005)
Beating the photon-number-splitting attack in practical quantum cryptography
XB Wang
PHYSICAL REVIEW LETTERS (2005)
Entanglement as a precondition for secure quantum key distribution -: art. no. 217903
M Curty et al.
PHYSICAL REVIEW LETTERS (2004)
Quantum key distribution with high loss: Toward global secure communication
WY Hwang
PHYSICAL REVIEW LETTERS (2003)
Security of practical time-reversed EPR quantum key distribution
H Inamori
ALGORITHMICA (2002)