Follow
Hoi-Kwong Lo
Title
Cited by
Cited by
Year
Decoy State Quantum Key Distribution
HK Lo, X Ma, K Chen
Physical Review Letters 94 (23), 230504, 2005
24432005
Measurement-device-independent quantum key distribution
HK Lo, M Curty, B Qi
Physical review letters 108 (13), 130503, 2012
20792012
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau
science 283 (5410), 2050-2056, 1999
20061999
How to share a quantum secret
R Cleve, D Gottesman, HK Lo
Physical review letters 83 (3), 648, 1999
15171999
Security of quantum key distribution with imperfect devices
D Gottesman, HK Lo, N Lutkenhaus, J Preskill
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004
12622004
Secure quantum key distribution
HK Lo, M Curty, K Tamaki
Nature Photonics 8 (8), 595-604, 2014
11852014
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A 72 (1), 012326, 2005
11282005
Secure quantum key distribution with realistic devices
F Xu, X Ma, Q Zhang, HK Lo, JW Pan
Reviews of Modern Physics 92 (2), 025002, 2020
9682020
Is quantum bit commitment really possible?
HK Lo, HF Chau
Physical Review Letters 78 (17), 3410, 1997
7781997
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A 78 (4), 042333, 2008
7412008
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity
HK Lo
Physical Review A 62 (1), 012313, 2000
7372000
Practical challenges in quantum key distribution
E Diamanti, HK Lo, B Qi, Z Yuan
npj Quantum Information 2 (1), 1-12, 2016
6352016
Efficient quantum key distribution scheme and a proof of its unconditional security
HK Lo, HF Chau, M Ardehali
Journal of Cryptology 18, 133-165, 2005
6232005
All-photonic quantum repeaters
K Azuma, K Tamaki, HK Lo
Nature communications 6 (1), 6787, 2015
5602015
Introduction to quantum computation and information
HK Lo, T Spiller, S Popescu
World Scientific, 1998
5441998
Insecurity of quantum secure computations
HK Lo
Physical Review A 56 (2), 1154, 1997
5131997
Time-shift attack in practical quantum cryptosystems
B Qi, CHF Fung, HK Lo, X Ma
arXiv preprint quant-ph/0512080, 2005
4882005
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 070502, 2006
4452006
Proof of security of quantum key distribution with two-way classical communications
D Gottesman, HK Lo
IEEE Transactions on Information Theory 49 (2), 457-475, 2003
4192003
Finite-key analysis for measurement-device-independent quantum key distribution
M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo
Nature communications 5 (1), 3732, 2014
4052014
The system can't perform the operation now. Try again later.
Articles 1–20