- Home
- Publications
- Publication Search
- Publication Details
Title
Effect of source tampering in the security of quantum cryptography
Authors
Keywords
-
Journal
PHYSICAL REVIEW A
Volume 92, Issue 2, Pages -
Publisher
American Physical Society (APS)
Online
2015-08-05
DOI
10.1103/physreva.92.022304
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution
- (2015) Charles Ci Wen Lim et al. IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS
- Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
- (2015) Nitin Jain et al. IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS
- Discrete-phase-randomized coherent state source and its application in quantum key distribution
- (2015) Zhu Cao et al. NEW JOURNAL OF PHYSICS
- Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
- (2015) Shihan Sajeed et al. PHYSICAL REVIEW A
- Robust random number generation using steady-state emission of gain-switched laser diodes
- (2014) Z. L. Yuan et al. APPLIED PHYSICS LETTERS
- Evaluation of the phase randomness of a light source in quantum-key-distribution systems with an attenuated laser
- (2014) Toshiya Kobayashi et al. PHYSICAL REVIEW A
- Loss-tolerant quantum cryptography with imperfect sources
- (2014) Kiyoshi Tamaki et al. PHYSICAL REVIEW A
- Laser Damage Helps the Eavesdropper in Quantum Cryptography
- (2014) Audun Nystad Bugge et al. PHYSICAL REVIEW LETTERS
- Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
- (2014) Zhiyuan Tang et al. PHYSICAL REVIEW LETTERS
- Measurement-Device-Independent Quantum Key Distribution over 200 km
- (2014) Yan-Lin Tang et al. PHYSICAL REVIEW LETTERS
- Experimental plug and play quantum coin flipping
- (2014) Anna Pappa et al. Nature Communications
- Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems
- (2013) Xiang-Chun Ma et al. PHYSICAL REVIEW A
- Source attack of decoy-state quantum key distribution using phase information
- (2013) Yan-Lin Tang et al. PHYSICAL REVIEW A
- Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
- (2013) T. Ferreira da Silva et al. PHYSICAL REVIEW A
- Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
- (2013) A. Rubenok et al. PHYSICAL REVIEW LETTERS
- Experimental Measurement-Device-Independent Quantum Key Distribution
- (2013) Yang Liu et al. PHYSICAL REVIEW LETTERS
- Experimental demonstration of an active phase randomization and monitor module for quantum key distribution
- (2012) Shi-Hai Sun et al. APPLIED PHYSICS LETTERS
- Ultrafast quantum random number generation based on quantum phase fluctuations
- (2012) Feihu Xu et al. OPTICS EXPRESS
- Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems
- (2012) Thiago Ferreira da Silva et al. OPTICS EXPRESS
- 2 GHz clock quantum key distribution over 260 km of standard telecom fiber
- (2012) Shuang Wang et al. OPTICS LETTERS
- Partially random phase attack to the practical two-way quantum-key-distribution system
- (2012) Shi-Hai Sun et al. PHYSICAL REVIEW A
- Blind Quantum Computing with Weak Coherent Pulses
- (2012) Vedran Dunjko et al. PHYSICAL REVIEW LETTERS
- Measurement-Device-Independent Quantum Key Distribution
- (2012) Hoi-Kwong Lo et al. PHYSICAL REVIEW LETTERS
- Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
- (2011) Henning Weier et al. NEW JOURNAL OF PHYSICS
- Heralded-qubit amplifiers for practical device-independent quantum key distribution
- (2011) Marcos Curty et al. PHYSICAL REVIEW A
- Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
- (2011) Shi-Hai Sun et al. PHYSICAL REVIEW A
- Device Calibration Impacts Security of Quantum Key Distribution
- (2011) Nitin Jain et al. PHYSICAL REVIEW LETTERS
- Full-field implementation of a perfect eavesdropper on a quantum cryptography system
- (2011) Ilja Gerhardt et al. Nature Communications
- Avoiding the blinding attack in QKD
- (2010) Z. L. Yuan et al. Nature Photonics
- Hacking commercial quantum cryptography systems by tailored bright illumination
- (2010) Lars Lydersen et al. Nature Photonics
- Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
- (2010) Feihu Xu et al. NEW JOURNAL OF PHYSICS
- Fast physical random number generator using amplified spontaneous emission
- (2010) Caitlin R. S. Williams et al. OPTICS EXPRESS
- Decoy-state quantum key distribution with polarized photons over 200 km
- (2010) Yang Liu et al. OPTICS EXPRESS
- Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier
- (2010) Nicolas Gisin et al. PHYSICAL REVIEW LETTERS
- Device-independent quantum key distribution secure against collective attacks
- (2009) Stefano Pironio et al. NEW JOURNAL OF PHYSICS
- Decoy-state quantum key distribution with both source errors and statistical fluctuations
- (2009) Xiang-Bin Wang et al. NEW JOURNAL OF PHYSICS
- Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation
- (2009) Anthony Leverrier et al. PHYSICAL REVIEW LETTERS
- Gigahertz quantum key distribution with InGaAs avalanche photodiodes
- (2008) Z. L. Yuan et al. APPLIED PHYSICS LETTERS
- General theory of decoy-state quantum cryptography with source errors
- (2008) Xiang-Bin Wang et al. PHYSICAL REVIEW A
- Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
- (2008) Yi Zhao et al. PHYSICAL REVIEW A
- Experimental Decoy-State Quantum Key Distribution with a Sub-Poissionian Heralded Single-Photon Source
- (2008) Qin Wang et al. PHYSICAL REVIEW LETTERS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started