Showing 1–20 of 144 results
/ Date/ Name
Mar 4, 2009Topological optimization of quantum key distribution networksFeb 5, 2013Reliable Entanglement VerificationJul 16, 2020Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing modelMay 26, 2019Asymptotic security analysis of discrete-modulated continuous-variable quantum key distributionSep 13, 2016Entanglement verification with detection-efficiency mismatchJun 27, 2014Quantum Communication with Coherent States and Linear OpticsSep 12, 2006Sequential attacks against differential-phase-shift quantum key distribution with weak coherent statesNov 17, 2007Testing Quantum Devices: Practical Entanglement Verification in Bipartite Optical SystemsOct 18, 2013Squashing model for detectors and applications to quantum key distribution protocolsOct 22, 1999Security against individual attacks for realistic quantum key distributionSep 6, 2011Improved Data Post-Processing in Quantum Key Distribution and Application to Loss Thresholds in Device Independent QKDNov 2, 2023Security Proof for Variable-Length Quantum Key DistributionFeb 14, 2025QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitationsMar 13, 2022Finite-Key Analysis of Quantum Key Distribution with Characterized Devices Using Entropy AccumulationMar 18, 2024Postselection technique for optical Quantum Key Distribution with improved de Finetti reductionsMay 26, 2024A consolidated and accessible security proof for finite-size decoy-state quantum key distributionDec 15, 2011Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal CloningJun 28, 2012Security proof of the unbalanced phase-encoded BB84 protocolJan 29, 2009Upper bounds for the secure key rate of decoy state quantum key distributionJan 20, 2023Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum Key Distribution Protocols