default search action
Hoi-Kwong Lo
Person information
- affiliation: University of Toronto, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2014
- [j18]Viacheslav Burenkov, Bing Qi, Ben Fortescue, Hoi-Kwong Lo:
Security of high speed quantum key distribution with finite detector dead time. Quantum Inf. Comput. 14(3-4): 217-235 (2014) - 2009
- [j17]Chi-Hang Fred Fung, Kiyoshi Tamaki, Bing Qi, Hoi-Kwong Lo, Xiongfeng Ma:
Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9(1&2): 131-165 (2009) - 2007
- [j16]Bing Qi, Chi-Hang Fred Fung, Hoi-Kwong Lo, Xiongfeng Ma:
Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1): 73-82 (2007) - [j15]Hoi-Kwong Lo, John Preskill:
Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf. Comput. 7(5): 431-458 (2007) - [j14]Marcos Curty, Lucy Liuxuan Zhang, Hoi-Kwong Lo, Norbert Lütkenhaus:
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states. Quantum Inf. Comput. 7(7): 665-688 (2007) - [j13]Kai Chen, Hoi-Kwong Lo:
Multi-partite quantum cryptographic protocols with noisy GHZ States. Quantum Inf. Comput. 7(8): 689-715 (2007) - 2005
- [j12]Hoi-Kwong Lo, Hoi Fung Chau, M. Ardehali:
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. J. Cryptol. 18(2): 133-165 (2005) - [j11]Hoi-Kwong Lo, Tsz-Mei Ko:
Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1): 41-48 (2005) - [j10]Paul Brumer, Daniel A. Lidar, Hoi-Kwong Lo, Aephraim Steinberg:
Editorial: quantum information and quantum control. Quantum Inf. Comput. 5(4): 273-274 (2005) - [j9]Hoi-Kwong Lo:
Getting something out of nothing. Quantum Inf. Comput. 5(4): 413-418 (2005) - 2004
- [j8]Daniel Gottesman, Hoi-Kwong Lo, Norbert Lütkenhaus, John Preskill:
Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4(5): 325-360 (2004) - [j7]Aram W. Harrow, Hoi-Kwong Lo:
A tight lower bound on the classical communication cost of entanglement dilution. IEEE Trans. Inf. Theory 50(2): 319-327 (2004) - 2003
- [j6]Jeffrey H. Shapiro, Hoi-Kwong Lo:
Editorial. Quantum Inf. Comput. 3(7): 469-470 (2003) - [j5]Daniel Gottesman, Hoi-Kwong Lo:
Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49(2): 457-475 (2003) - 2001
- [j4]Hoi-Kwong Lo:
Editorial. Quantum Inf. Comput. 1(1): 1-2 (2001) - [j3]Hoi-Kwong Lo:
Proof of unconditional security of six-state quantum key distribution scheme. Quantum Inf. Comput. 1(2): 81-94 (2001) - 2000
- [j2]Samuel L. Braunstein, Christopher A. Fuchs, Daniel Gottesman, Hoi-Kwong Lo:
A quantum analog of huffman coding. IEEE Trans. Inf. Theory 46(4): 1644-1649 (2000) - 1997
- [j1]Hoi Fung Chau, Hoi-Kwong Lo:
One-Way Functions in Reversible Computations. Cryptologia 21(2): 139-148 (1997)
Conference and Workshop Papers
- 2023
- [c8]Olinka Bedroya, Chenyang Li, Wenyuan Wang, Jianyong Hu, Hoi-Kwong Lo, Li Qian:
MDI-QKD with resource-efficient polarization compensation. OFC 2023: 1-3 - 2006
- [c7]Bing Qi, Leilei Huang, Hoi-Kwong Lo, Li Qian:
Quantum key distribution based on a Sagnac loop interferometer and polarization-insensitive phase modulators. ISIT 2006: 2090-2093 - [c6]Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian:
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber. ISIT 2006: 2094-2098 - 2005
- [c5]Ben Fortescue, Hoi-Kwong Lo:
Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite quantum states. ISIT 2005: 889-892 - [c4]Kiyoshi Tamaki, Hoi-Kwong Lo:
Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution. ISIT 2005: 1603-1606 - [c3]Kai Chen, Hoi-Kwong Lo:
Conference key agreement and quantum sharing of classical secrets with noisy GHZ states. ISIT 2005: 1607-1611 - 2004
- [c2]Daniel Gottesman, Hoi-Kwong Lo, Norbert Lütkenhaus, John Preskill:
Security of quantum key distribution with imperfect devices. ISIT 2004: 136 - [c1]Hoi-Kwong Lo:
Quantum key distribution with vacua or dim pulses as decoy states. ISIT 2004: 137
Editorship
- 2009
- [e1]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
Classical and Quantum Information Assurance Foundations and Practice, 26.07. - 31.07.2009. Dagstuhl Seminar Proceedings 09311, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents]
Reference Works
- 2009
- [r1]Hoi-Kwong Lo, Yi Zhao:
Quantum Cryptography. Encyclopedia of Complexity and Systems Science 2009: 7265-7289
Informal and Other Publications
- 2024
- [i12]Jie Lin, Hoi-Kwong Lo, Jacob Johannsson, Mattia Montagna, Manfred von Willich:
Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol. CoRR abs/2407.20969 (2024) - 2023
- [i11]Jie Lin, Manfred von Willich, Hoi-Kwong Lo:
Composable Security of Distributed Symmetric Key Exchange Protocol. CoRR abs/2304.13789 (2023) - 2022
- [i10]Hoi-Kwong Lo, Mattia Montagna, Manfred von Willich:
Quantum Key Infrastructure: A scalable quantum-proof key distribution system. CoRR abs/2205.00615 (2022) - 2012
- [i9]Xiongfeng Ma, Feihu Xu, He Xu, Xiaoqing Tan, Bing Qi, Hoi-Kwong Lo:
Postprocessing for quantum random number generators: entropy evaluation and randomness extraction. CoRR abs/1207.1473 (2012) - 2009
- [i8]Samuel L. Braunstein, Hoi-Kwong Lo, Kenny Paterson, Peter Y. A. Ryan:
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice. Classical and Quantum Information Assurance Foundations and Practice 2009 - 2006
- [i7]Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, Hoi-Kwong Lo:
Phase-Remapping Attack in Practical Quantum Key Distribution Systems. CoRR abs/quant-ph/0601115 (2006) - 2005
- [i6]Kai Chen, Hoi-Kwong Lo:
Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy GHZ States. CoRR abs/cs/0508094 (2005) - 1999
- [i5]Hoi-Kwong Lo:
A simple proof of the unconditional security of quantum key distribution. CoRR quant-ph/9904091 (1999) - 1998
- [i4]Hoi Fung Chau, Hoi-Kwong Lo:
Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment). IACR Cryptol. ePrint Arch. 1998: 17 (1998) - [i3]Hoi-Kwong Lo:
Insecurity of Quantum Computations. IACR Cryptol. ePrint Arch. 1998: 22 (1998) - 1996
- [i2]Hoi-Kwong Lo, Hoi Fung Chau:
Is Quantum Bit Commitment Really Possible? CoRR quant-ph/9603004 (1996) - [i1]Hoi-Kwong Lo:
Insecurity of Quantum Secure Computations. CoRR quant-ph/9611031 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint