Related references
Note: Only part of the references are listed.Simple and high-speed polarization-based QKD
Fadri Grunenfelder et al.
APPLIED PHYSICS LETTERS (2018)
Simple 2.5 GHz time-bin quantum key distribution
Alberto Boaron et al.
APPLIED PHYSICS LETTERS (2018)
Practical device-independent quantum cryptography via entropy accumulation
Rotem Arnon-Friedman et al.
NATURE COMMUNICATIONS (2018)
Security of quantum key distribution with iterative sifting
Kiyoshi Tamaki et al.
QUANTUM SCIENCE AND TECHNOLOGY (2018)
Integrated silicon photonics for high-speed quantum key distribution
Philip Sibson et al.
OPTICA (2017)
A largely self-contained and complete security proof for quantum key distribution
Marco Tomamichel et al.
QUANTUM (2017)
Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling
Shun Kawakami et al.
PHYSICAL REVIEW A (2017)
Improved key-rate bounds for practical decoy-state quantum-key-distribution systems
Zhen Zhang et al.
PHYSICAL REVIEW A (2017)
Optimal decoy intensity for decoy quantum key distribution
Masahito Hayashi
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL (2016)
Silicon photonic transmitter for polarization-encoded quantum key distribution
Chaoxuan Ma et al.
OPTICA (2016)
Experimental measurement-device-independent quantum key distribution with imperfect sources
Zhiyuan Tang et al.
PHYSICAL REVIEW A (2016)
Security of quantum key distribution with light sources that are not independently and identically distributed
Yuichi Nagamatsu et al.
PHYSICAL REVIEW A (2016)
Finite-key security analysis of quantum key distribution with imperfect light sources
Akihiro Mizutani et al.
NEW JOURNAL OF PHYSICS (2015)
Experimental quantum key distribution with source flaws
Feihu Xu et al.
PHYSICAL REVIEW A (2015)
Effect of source tampering in the security of quantum cryptography
Shi-Hai Sun et al.
PHYSICAL REVIEW A (2015)
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
Shihan Sajeed et al.
PHYSICAL REVIEW A (2015)
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
Masahito Hayashi et al.
NEW JOURNAL OF PHYSICS (2014)
Concise security bounds for practical decoy-state quantum key distribution
Charles Ci Wen Lim et al.
PHYSICAL REVIEW A (2014)
Loss-tolerant quantum cryptography with imperfect sources
Kiyoshi Tamaki et al.
PHYSICAL REVIEW A (2014)
Fully Device-Independent Quantum Key Distribution
Umesh Vazirani et al.
PHYSICAL REVIEW LETTERS (2014)
Finite-key analysis for measurement-device-independent quantum key distribution
Marcos Curty et al.
NATURE COMMUNICATIONS (2014)
Memory Attacks on Device-Independent Quantum Cryptography
Jonathan Barrett et al.
PHYSICAL REVIEW LETTERS (2013)
Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths
Masahito Hayashi et al.
NEW JOURNAL OF PHYSICS (2012)
Measurement-Device-Independent Quantum Key Distribution
Hoi-Kwong Lo et al.
PHYSICAL REVIEW LETTERS (2012)
Tight finite-key analysis for quantum cryptography
Marco Tomamichel et al.
NATURE COMMUNICATIONS (2012)
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
Henning Weier et al.
NEW JOURNAL OF PHYSICS (2011)
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Ilja Gerhardt et al.
NATURE COMMUNICATIONS (2011)
Hacking commercial quantum cryptography systems by tailored bright illumination
Lars Lydersen et al.
NATURE PHOTONICS (2010)
Simple security proof of quantum key distribution based on complementarity
M. Koashi
NEW JOURNAL OF PHYSICS (2009)
General theory of decoy-state quantum cryptography with source errors
Xiang-Bin Wang et al.
PHYSICAL REVIEW A (2008)
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Yi Zhao et al.
PHYSICAL REVIEW A (2008)
Effects of detector efficiency mismatch on security of quantum cryptosystems [Phys. Rev. A 74, 022313 (2006)]
Vadim Makarov et al.
PHYSICAL REVIEW A (2008)
Breaking a quantum key distribution system through a timing side channel
Antia Lamas-Linares et al.
OPTICS EXPRESS (2007)
Device-independent security of quantum cryptography against collective attacks
Antonio Acin et al.
PHYSICAL REVIEW LETTERS (2007)
Effects of detector efficiency mismatch on security of quantum cryptosystems
Vadim Makarov et al.
PHYSICAL REVIEW A (2006)
Decoy state quantum key distribution
HK Lo et al.
PHYSICAL REVIEW LETTERS (2005)
Beating the photon-number-splitting attack in practical quantum cryptography
XB Wang
PHYSICAL REVIEW LETTERS (2005)
Quantum key distribution with high loss: Toward global secure communication
WY Hwang
PHYSICAL REVIEW LETTERS (2003)