Decoy State Quantum Key Distribution HK Lo, X Ma, K Chen Physical Review Letters 94 (23), 230504, 2005 | 2575 | 2005 |
Measurement-device-independent quantum key distribution HK Lo, M Curty, B Qi Physical review letters 108 (13), 130503, 2012 | 2251 | 2012 |
Unconditional security of quantum key distribution over arbitrarily long distances HK Lo, HF Chau science 283 (5410), 2050-2056, 1999 | 2071 | 1999 |
How to share a quantum secret R Cleve, D Gottesman, HK Lo Physical review letters 83 (3), 648, 1999 | 1557 | 1999 |
Security of quantum key distribution with imperfect devices D Gottesman, HK Lo, N Lutkenhaus, J Preskill International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004 | 1344 | 2004 |
Secure quantum key distribution HK Lo, M Curty, K Tamaki Nature Photonics 8 (8), 595-604, 2014 | 1291 | 2014 |
Practical decoy state for quantum key distribution X Ma, B Qi, Y Zhao, HK Lo Physical Review A—Atomic, Molecular, and Optical Physics 72 (1), 012326, 2005 | 1209 | 2005 |
Secure quantum key distribution with realistic devices F Xu, X Ma, Q Zhang, HK Lo, JW Pan Reviews of modern physics 92 (2), 025002, 2020 | 1192 | 2020 |
Is quantum bit commitment really possible? HK Lo, HF Chau Physical Review Letters 78 (17), 3410, 1997 | 800 | 1997 |
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems Y Zhao, CHF Fung, B Qi, C Chen, HK Lo Physical Review A—Atomic, Molecular, and Optical Physics 78 (4), 042333, 2008 | 781 | 2008 |
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity HK Lo Physical Review A 62 (1), 012313, 2000 | 753 | 2000 |
Practical challenges in quantum key distribution E Diamanti, HK Lo, B Qi, Z Yuan npj Quantum Information 2 (1), 1-12, 2016 | 712 | 2016 |
Efficient quantum key distribution scheme and a proof of its unconditional security HK Lo, HF Chau, M Ardehali Journal of Cryptology 18, 133-165, 2005 | 652 | 2005 |
All-photonic quantum repeaters K Azuma, K Tamaki, HK Lo Nature communications 6 (1), 1-7, 2015 | 640 | 2015 |
Introduction to quantum computation and information HK Lo, T Spiller, S Popescu World Scientific, 1998 | 563 | 1998 |
Insecurity of quantum secure computations HK Lo Physical Review A 56 (2), 1154, 1997 | 548 | 1997 |
Time-shift attack in practical quantum cryptosystems B Qi, CHF Fung, HK Lo, X Ma arXiv preprint quant-ph/0512080, 2005 | 494 | 2005 |
Experimental quantum key distribution with decoy states Y Zhao, B Qi, X Ma, HK Lo, L Qian Physical review letters 96 (7), 070502, 2006 | 452 | 2006 |
Proof of security of quantum key distribution with two-way classical communications D Gottesman, HK Lo IEEE Transactions on Information Theory 49 (2), 457-475, 2003 | 427 | 2003 |
Finite-key analysis for measurement-device-independent quantum key distribution M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo Nature communications 5 (1), 3732, 2014 | 425 | 2014 |