Author pages are created from data sourced from our academic publisher partnerships and public sources.

Publications Influence

Quantum Cryptography

- N. Gisin, G. Ribordy, W. Tittel, H. Zbinden
- Physics
- 19 January 2001

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2… Expand

798 76- PDF

Quantum cryptography

- H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin, G. Ribordy
- Physics, Computer Science
- 1 June 2001

1,255 33

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

- V. Scarani, A. Acin, G. Ribordy, N. Gisin
- Physics, Medicine
- Physical review letters
- 20 November 2002

We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original… Expand

506 30- PDF

Combined effects of polarization mode dispersion and polarization dependent losses in optical fibers

- N. Gisin, B. Huttner
- Physics
- 1 October 1997

Abstract A general description of the effects of combined polarization mode dispersion (PMD) and polarization dependent losses (PDL) in single-mode optical fiber networks is presented. It generalizes… Expand

206 22

Polarization-induced distortions in optical fiber networks with polarization-mode dispersion and polarization-dependent losses

- B. Huttner, C. Geiser, N. Gisin
- Physics
- IEEE Journal of Selected Topics in Quantum…
- 1 March 2000

We review the formalism required to investigate the combined effects of polarization-mode dispersion (PMD) and polarization dependent losses (PDL) in optical fiber networks. The combination of PMD… Expand

161 21

A relevant two qubit Bell inequality inequivalent to the CHSH inequality

- D. Collins, N. Gisin
- Mathematics, Physics
- 19 June 2003

We computationally investigate the complete polytope of Bell inequalities for two particles with small numbers of possible measurements and outcomes. Our approach is limited by Pitowsky's connection… Expand

263 21- PDF

Information-theoretic security proof for quantum-key-distribution protocols (17 pages)

We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement… Expand

293 20- PDF

Device-independent security of quantum cryptography against collective attacks.

- A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, V. Scarani
- Physics, Medicine
- Physical review letters
- 15 February 2007

We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution… Expand

924 19- PDF

Single photon detector fabricated in a complementary metal-oxide-semiconductor high-voltage technology

In this article, a fully integrated single photon detector including a silicon avalanche photodiode and a quenching circuit is presented. The low doping concentrations, inherent to the complementary… Expand

204 19- PDF

Security of quantum key distribution using d-level systems.

- N. Cerf, M. Bourennane, A. Karlsson, N. Gisin
- Physics, Medicine
- Physical review letters
- 26 July 2001

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases… Expand

772 18- PDF