Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hoi-Kwong Lo
@inproceedings{DBLP:conf/ofc/BedroyaLWHLQ23, author = {Olinka Bedroya and Chenyang Li and Wenyuan Wang and Jianyong Hu and Hoi{-}Kwong Lo and Li Qian}, title = {{MDI-QKD} with resource-efficient polarization compensation}, booktitle = {Optical Fiber Communications Conference and Exhibition, {OFC} 2023, San Diego, CA, USA, March 5-9, 2023}, pages = {1--3}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/OFC49934.2023.10117206}, doi = {10.23919/OFC49934.2023.10117206}, timestamp = {Thu, 01 Jun 2023 08:58:39 +0200}, biburl = {https://dblp.org/rec/conf/ofc/BedroyaLWHLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-13789, author = {Jie Lin and Manfred von Willich and Hoi{-}Kwong Lo}, title = {Composable Security of Distributed Symmetric Key Exchange Protocol}, journal = {CoRR}, volume = {abs/2304.13789}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.13789}, doi = {10.48550/ARXIV.2304.13789}, eprinttype = {arXiv}, eprint = {2304.13789}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-13789.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00615, author = {Hoi{-}Kwong Lo and Mattia Montagna and Manfred von Willich}, title = {Quantum Key Infrastructure: {A} scalable quantum-proof key distribution system}, journal = {CoRR}, volume = {abs/2205.00615}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00615}, doi = {10.48550/ARXIV.2205.00615}, eprinttype = {arXiv}, eprint = {2205.00615}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/BurenkovQFL14, author = {Viacheslav Burenkov and Bing Qi and Ben Fortescue and Hoi{-}Kwong Lo}, title = {Security of high speed quantum key distribution with finite detector dead time}, journal = {Quantum Inf. Comput.}, volume = {14}, number = {3-4}, pages = {217--235}, year = {2014}, url = {https://doi.org/10.26421/QIC14.3-4-2}, doi = {10.26421/QIC14.3-4-2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/BurenkovQFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-1473, author = {Xiongfeng Ma and Feihu Xu and He Xu and Xiaoqing Tan and Bing Qi and Hoi{-}Kwong Lo}, title = {Postprocessing for quantum random number generators: entropy evaluation and randomness extraction}, journal = {CoRR}, volume = {abs/1207.1473}, year = {2012}, url = {http://arxiv.org/abs/1207.1473}, eprinttype = {arXiv}, eprint = {1207.1473}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-1473.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/FungTQLM09, author = {Chi{-}Hang Fred Fung and Kiyoshi Tamaki and Bing Qi and Hoi{-}Kwong Lo and Xiongfeng Ma}, title = {Security proof of quantum key distribution with detection efficiency mismatch}, journal = {Quantum Inf. Comput.}, volume = {9}, number = {1{\&}2}, pages = {131--165}, year = {2009}, url = {https://doi.org/10.26421/QIC9.1-2-8}, doi = {10.26421/QIC9.1-2-8}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/FungTQLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9311, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09311/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/complexity/LoZ09, author = {Hoi{-}Kwong Lo and Yi Zhao}, editor = {Robert A. Meyers}, title = {Quantum Cryptography}, booktitle = {Encyclopedia of Complexity and Systems Science}, pages = {7265--7289}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-30440-3\_432}, doi = {10.1007/978-0-387-30440-3\_432}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/complexity/LoZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BraunsteinLPR09, author = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, editor = {Samuel L. Braunstein and Hoi{-}Kwong Lo and Kenny Paterson and Peter Y. A. Ryan}, title = {09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice}, booktitle = {Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09311}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2365/}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BraunsteinLPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/QiFLM07, author = {Bing Qi and Chi{-}Hang Fred Fung and Hoi{-}Kwong Lo and Xiongfeng Ma}, title = {Time-shift attack in practical quantum cryptosystems}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {1}, pages = {73--82}, year = {2007}, url = {https://doi.org/10.26421/QIC7.1-2-3}, doi = {10.26421/QIC7.1-2-3}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/QiFLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/LoP07, author = {Hoi{-}Kwong Lo and John Preskill}, title = {Security of quantum key distribution using weak coherent states with nonrandom phases}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {5}, pages = {431--458}, year = {2007}, url = {https://doi.org/10.26421/QIC7.5-6-2}, doi = {10.26421/QIC7.5-6-2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/LoP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/CurtyZLL07, author = {Marcos Curty and Lucy Liuxuan Zhang and Hoi{-}Kwong Lo and Norbert L{\"{u}}tkenhaus}, title = {Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {7}, pages = {665--688}, year = {2007}, url = {https://doi.org/10.26421/QIC7.7-7}, doi = {10.26421/QIC7.7-7}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/CurtyZLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/ChenL07, author = {Kai Chen and Hoi{-}Kwong Lo}, title = {Multi-partite quantum cryptographic protocols with noisy {GHZ} States}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {8}, pages = {689--715}, year = {2007}, url = {https://doi.org/10.26421/QIC7.8-1}, doi = {10.26421/QIC7.8-1}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/ChenL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/QiHLQ06, author = {Bing Qi and Leilei Huang and Hoi{-}Kwong Lo and Li Qian}, title = {Quantum key distribution based on a Sagnac loop interferometer and polarization-insensitive phase modulators}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {2090--2093}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261919}, doi = {10.1109/ISIT.2006.261919}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/QiHLQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/ZhaoQMLQ06, author = {Yi Zhao and Bing Qi and Xiongfeng Ma and Hoi{-}Kwong Lo and Li Qian}, title = {Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {2094--2098}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261920}, doi = {10.1109/ISIT.2006.261920}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/ZhaoQMLQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-quant-ph-0601115, author = {Chi{-}Hang Fred Fung and Bing Qi and Kiyoshi Tamaki and Hoi{-}Kwong Lo}, title = {Phase-Remapping Attack in Practical Quantum Key Distribution Systems}, journal = {CoRR}, volume = {abs/quant-ph/0601115}, year = {2006}, url = {http://arxiv.org/abs/quant-ph/0601115}, eprinttype = {arXiv}, eprint = {quant-ph/0601115}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-quant-ph-0601115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LoCA05, author = {Hoi{-}Kwong Lo and Hoi Fung Chau and M. Ardehali}, title = {Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security}, journal = {J. Cryptol.}, volume = {18}, number = {2}, pages = {133--165}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0142-y}, doi = {10.1007/S00145-004-0142-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LoCA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/LoK05, author = {Hoi{-}Kwong Lo and Tsz{-}Mei Ko}, title = {Some attacks on quantum-based cryptographic protocols}, journal = {Quantum Inf. Comput.}, volume = {5}, number = {1}, pages = {41--48}, year = {2005}, url = {https://doi.org/10.26421/QIC5.1-4}, doi = {10.26421/QIC5.1-4}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/LoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/BrumerLLS05, author = {Paul Brumer and Daniel A. Lidar and Hoi{-}Kwong Lo and Aephraim Steinberg}, title = {Editorial: quantum information and quantum control}, journal = {Quantum Inf. Comput.}, volume = {5}, number = {4}, pages = {273--274}, year = {2005}, url = {https://doi.org/10.26421/QIC5.45-1}, doi = {10.26421/QIC5.45-1}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/BrumerLLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/Lo05, author = {Hoi{-}Kwong Lo}, title = {Getting something out of nothing}, journal = {Quantum Inf. Comput.}, volume = {5}, number = {4}, pages = {413--418}, year = {2005}, url = {https://doi.org/10.26421/QIC5.45-10}, doi = {10.26421/QIC5.45-10}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/Lo05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/FortescueL05, author = {Ben Fortescue and Hoi{-}Kwong Lo}, title = {Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite quantum states}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {889--892}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523465}, doi = {10.1109/ISIT.2005.1523465}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/FortescueL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/TamakiL05, author = {Kiyoshi Tamaki and Hoi{-}Kwong Lo}, title = {Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1603--1606}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523615}, doi = {10.1109/ISIT.2005.1523615}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/TamakiL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/0008L05, author = {Kai Chen and Hoi{-}Kwong Lo}, title = {Conference key agreement and quantum sharing of classical secrets with noisy {GHZ} states}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1607--1611}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523616}, doi = {10.1109/ISIT.2005.1523616}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/0008L05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0508094, author = {Kai Chen and Hoi{-}Kwong Lo}, title = {Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy {GHZ} States}, journal = {CoRR}, volume = {abs/cs/0508094}, year = {2005}, url = {http://arxiv.org/abs/cs/0508094}, eprinttype = {arXiv}, eprint = {cs/0508094}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0508094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/GottesmanLLP04, author = {Daniel Gottesman and Hoi{-}Kwong Lo and Norbert L{\"{u}}tkenhaus and John Preskill}, title = {Security of quantum key distribution with imperfect devices}, journal = {Quantum Inf. Comput.}, volume = {4}, number = {5}, pages = {325--360}, year = {2004}, url = {https://doi.org/10.26421/QIC4.5-1}, doi = {10.26421/QIC4.5-1}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/GottesmanLLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HarrowL04, author = {Aram W. Harrow and Hoi{-}Kwong Lo}, title = {A tight lower bound on the classical communication cost of entanglement dilution}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {2}, pages = {319--327}, year = {2004}, url = {https://doi.org/10.1109/TIT.2003.822597}, doi = {10.1109/TIT.2003.822597}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/HarrowL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/GottesmanLLP04, author = {Daniel Gottesman and Hoi{-}Kwong Lo and Norbert L{\"{u}}tkenhaus and John Preskill}, title = {Security of quantum key distribution with imperfect devices}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {136}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365172}, doi = {10.1109/ISIT.2004.1365172}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/GottesmanLLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Lo04, author = {Hoi{-}Kwong Lo}, title = {Quantum key distribution with vacua or dim pulses as decoy states}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {137}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365174}, doi = {10.1109/ISIT.2004.1365174}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Lo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/ShapiroL03, author = {Jeffrey H. Shapiro and Hoi{-}Kwong Lo}, title = {Editorial}, journal = {Quantum Inf. Comput.}, volume = {3}, number = {7}, pages = {469--470}, year = {2003}, url = {https://doi.org/10.26421/QIC3.s-1}, doi = {10.26421/QIC3.S-1}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/ShapiroL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GottesmanL03, author = {Daniel Gottesman and Hoi{-}Kwong Lo}, title = {Proof of security of quantum key distribution with two-way classical communications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {2}, pages = {457--475}, year = {2003}, url = {https://doi.org/10.1109/TIT.2002.807289}, doi = {10.1109/TIT.2002.807289}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GottesmanL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/Lo01, author = {Hoi{-}Kwong Lo}, title = {Editorial}, journal = {Quantum Inf. Comput.}, volume = {1}, number = {1}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.26421/QIC1.1-1}, doi = {10.26421/QIC1.1-1}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/Lo01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/Lo01a, author = {Hoi{-}Kwong Lo}, title = {Proof of unconditional security of six-state quantum key distribution scheme}, journal = {Quantum Inf. Comput.}, volume = {1}, number = {2}, pages = {81--94}, year = {2001}, url = {https://doi.org/10.26421/QIC1.2-4}, doi = {10.26421/QIC1.2-4}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/Lo01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BraunsteinFGL00, author = {Samuel L. Braunstein and Christopher A. Fuchs and Daniel Gottesman and Hoi{-}Kwong Lo}, title = {A quantum analog of huffman coding}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {4}, pages = {1644--1649}, year = {2000}, url = {https://doi.org/10.1109/18.850709}, doi = {10.1109/18.850709}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BraunsteinFGL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/quant-ph-9904091, author = {Hoi{-}Kwong Lo}, title = {A simple proof of the unconditional security of quantum key distribution}, journal = {CoRR}, volume = {quant-ph/9904091}, year = {1999}, url = {http://arxiv.org/abs/quant-ph/9904091}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/quant-ph-9904091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChauL98, author = {Hoi Fung Chau and Hoi{-}Kwong Lo}, title = {Making An Empty Promise With {A} Quantum Computer (Or, {A} Brief Review on the Impossibility of Quantum Bit Commitment)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {1998}, url = {http://eprint.iacr.org/1998/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChauL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lo98, author = {Hoi{-}Kwong Lo}, title = {Insecurity of Quantum Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {1998}, url = {http://eprint.iacr.org/1998/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChauL97, author = {Hoi Fung Chau and Hoi{-}Kwong Lo}, title = {One-Way Functions in Reversible Computations}, journal = {Cryptologia}, volume = {21}, number = {2}, pages = {139--148}, year = {1997}, url = {https://doi.org/10.1080/0161-119791885869}, doi = {10.1080/0161-119791885869}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChauL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/quant-ph-9603004, author = {Hoi{-}Kwong Lo and Hoi Fung Chau}, title = {Is Quantum Bit Commitment Really Possible?}, journal = {CoRR}, volume = {quant-ph/9603004}, year = {1996}, url = {http://arxiv.org/abs/quant-ph/9603004}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/quant-ph-9603004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/quant-ph-9611031, author = {Hoi{-}Kwong Lo}, title = {Insecurity of Quantum Secure Computations}, journal = {CoRR}, volume = {quant-ph/9611031}, year = {1996}, url = {http://arxiv.org/abs/quant-ph/9611031}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/quant-ph-9611031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.