Follow
Hoi-Kwong Lo
Title
Cited by
Cited by
Year
Decoy State Quantum Key Distribution
HK Lo, X Ma, K Chen
Physical Review Letters 94 (23), 230504, 2005
25752005
Measurement-device-independent quantum key distribution
HK Lo, M Curty, B Qi
Physical review letters 108 (13), 130503, 2012
22512012
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau
science 283 (5410), 2050-2056, 1999
20711999
How to share a quantum secret
R Cleve, D Gottesman, HK Lo
Physical review letters 83 (3), 648, 1999
15571999
Security of quantum key distribution with imperfect devices
D Gottesman, HK Lo, N Lutkenhaus, J Preskill
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004
13442004
Secure quantum key distribution
HK Lo, M Curty, K Tamaki
Nature Photonics 8 (8), 595-604, 2014
12912014
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 72 (1), 012326, 2005
12092005
Secure quantum key distribution with realistic devices
F Xu, X Ma, Q Zhang, HK Lo, JW Pan
Reviews of modern physics 92 (2), 025002, 2020
11922020
Is quantum bit commitment really possible?
HK Lo, HF Chau
Physical Review Letters 78 (17), 3410, 1997
8001997
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A—Atomic, Molecular, and Optical Physics 78 (4), 042333, 2008
7812008
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity
HK Lo
Physical Review A 62 (1), 012313, 2000
7532000
Practical challenges in quantum key distribution
E Diamanti, HK Lo, B Qi, Z Yuan
npj Quantum Information 2 (1), 1-12, 2016
7122016
Efficient quantum key distribution scheme and a proof of its unconditional security
HK Lo, HF Chau, M Ardehali
Journal of Cryptology 18, 133-165, 2005
6522005
All-photonic quantum repeaters
K Azuma, K Tamaki, HK Lo
Nature communications 6 (1), 1-7, 2015
6402015
Introduction to quantum computation and information
HK Lo, T Spiller, S Popescu
World Scientific, 1998
5631998
Insecurity of quantum secure computations
HK Lo
Physical Review A 56 (2), 1154, 1997
5481997
Time-shift attack in practical quantum cryptosystems
B Qi, CHF Fung, HK Lo, X Ma
arXiv preprint quant-ph/0512080, 2005
4942005
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 070502, 2006
4522006
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo
IEEE Transactions on Information Theory 49 (2), 457-475, 2003
4272003
Finite-key analysis for measurement-device-independent quantum key distribution
M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo
Nature communications 5 (1), 3732, 2014
4252014
The system can't perform the operation now. Try again later.
Articles 1–20