Secure quantum key distribution
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised
to revolutionize cryptography as we know it today. In this Review, we introduce the …
to revolutionize cryptography as we know it today. In this Review, we introduce the …
Secure quantum key distribution with realistic devices
… If we allow one-way key reconciliation, the cost in this step is H(A\B), where A and B represent
the random variables of Alice,s and Bob,s sifted key, respectively. In a symmetric channel …
the random variables of Alice,s and Bob,s sifted key, respectively. In a symmetric channel …
Exoskeleton robots for upper-limb rehabilitation: State of the art and future prospects
HS Lo, SQ Xie - Medical engineering & physics, 2012 - Elsevier
Current health services are struggling to provide optimal rehabilitation therapy to victims of
stroke. This has motivated researchers to explore the use of robotic devices to provide …
stroke. This has motivated researchers to explore the use of robotic devices to provide …
Unconditional security of quantum key distribution over arbitrarily long distances
HK Lo, HF Chau - science, 1999 - science.org
… For a review on quantum cryptography, see, for example, H.-K. … H.-K. Lo particularly thanks
A. Ekert for pressing him to investigate the security of QKD. We thank numerous colleagues, …
A. Ekert for pressing him to investigate the security of QKD. We thank numerous colleagues, …
Decoy state quantum key distribution
… H.-KL also thanks travel support from the INI, Cambridge, UK, and from the IQI at Caltech
through … fields.utoronto.ca/programs/scientific/04-05/quantumIC/ abstracts/lo.ppt July, 2004. …
through … fields.utoronto.ca/programs/scientific/04-05/quantumIC/ abstracts/lo.ppt July, 2004. …
[HTML][HTML] Nonfilamentous C. albicans mutants are avirulent
HJ Lo, JR Köhler, B DiDomenico, D Loebenberg… - Cell, 1997 - cell.com
… G) cph1/cph1 efg1/efg1 (HLC54); (H) cph1/cph1 efg1/efg1 containing an integrated copy of
EFG1 … (h) cph1/cph1 efg1/efg1 in three macrophages 20 hr after infection, containing up to 80 …
EFG1 … (h) cph1/cph1 efg1/efg1 in three macrophages 20 hr after infection, containing up to 80 …
Measurement-device-independent quantum key distribution
How to remove detector side channel attacks has been a notoriously hard problem in
quantum cryptography. Here, we propose a simple solution to this problem—measurement-device-…
quantum cryptography. Here, we propose a simple solution to this problem—measurement-device-…
Improved broadband and quasi-omnidirectional anti-reflection properties with biomimetic silicon nanostructures
Nature routinely produces nanostructured surfaces with useful properties 1 , 2 , 3 , 4 , such
as the self-cleaning lotus leaf 5 , the colour of the butterfly wing 6 , the photoreceptor in …
as the self-cleaning lotus leaf 5 , the colour of the butterfly wing 6 , the photoreceptor in …
How to share a quantum secret
We investigate the concept of quantum secret sharing. In a (k, n) threshold scheme, a secret
quantum state is divided into n shares such that any k of those shares can be used to …
quantum state is divided into n shares such that any k of those shares can be used to …
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol
in the case where the source and detector are under the limited control of an adversary. …
in the case where the source and detector are under the limited control of an adversary. …