• Publications
  • Influence
Quantum Cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2Expand
  • 798
  • 76
  • PDF
Quantum cryptography
  • 1,255
  • 33
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the originalExpand
  • 506
  • 30
  • PDF
Combined effects of polarization mode dispersion and polarization dependent losses in optical fibers
Abstract A general description of the effects of combined polarization mode dispersion (PMD) and polarization dependent losses (PDL) in single-mode optical fiber networks is presented. It generalizesExpand
  • 206
  • 22
Polarization-induced distortions in optical fiber networks with polarization-mode dispersion and polarization-dependent losses
We review the formalism required to investigate the combined effects of polarization-mode dispersion (PMD) and polarization dependent losses (PDL) in optical fiber networks. The combination of PMDExpand
  • 161
  • 21
A relevant two qubit Bell inequality inequivalent to the CHSH inequality
We computationally investigate the complete polytope of Bell inequalities for two particles with small numbers of possible measurements and outcomes. Our approach is limited by Pitowsky's connectionExpand
  • 263
  • 21
  • PDF
Information-theoretic security proof for quantum-key-distribution protocols (17 pages)
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglementExpand
  • 293
  • 20
  • PDF
Device-independent security of quantum cryptography against collective attacks.
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distributionExpand
  • 924
  • 19
  • PDF
Single photon detector fabricated in a complementary metal-oxide-semiconductor high-voltage technology
In this article, a fully integrated single photon detector including a silicon avalanche photodiode and a quenching circuit is presented. The low doping concentrations, inherent to the complementaryExpand
  • 204
  • 19
  • PDF
Security of quantum key distribution using d-level systems.
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased basesExpand
  • 772
  • 18
  • PDF