Yulin Zheng

Follow

Generating author description...

Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Decoy State Quantum Key Distribution 2005 Hoi‐Kwong Lo
Xiongfeng Ma
Kai Chen
2
+ PDF Chat Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography 2005 Xiang‐Bin Wang
2
+ PDF Chat Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances 1999 Hoi-Kwong Lo
H. F. Chau
2
+ PDF Chat Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors 2011 H. Weier
Harald Krauss
Markus Rau
Martin Fürst
Sebastian Nauerth
Harald Weinfurter
2
+ PDF Chat The security of practical quantum key distribution 2009 Valerio Scarani
H. Bechmann-Pasquinucci
Nicolas J. Cerf
Miloslav Dušek
Norbert Lütkenhaus
Momtchil Peev
2
+ PDF Chat Measurement-Device-Independent Quantum Key Distribution over 200 km 2014 Yan-Lin Tang
Hua‐Lei Yin
Sijing Chen
Yang Liu
Weijun Zhang
Xiao Jiang
Lu Zhang
Jian Wang
Lixing You
Jian-Yu Guan
2
+ PDF Chat Quantum cryptography 2002 Nicolas Gisin
G. Ribordy
Wolfgang Tittel
Hugo Zbinden
2
+ PDF Chat Measurement-Device-Independent Quantum Key Distribution 2012 Hoi‐Kwong Lo
Marcos Curty
Bing Qi
2
+ PDF Chat Hacking commercial quantum cryptography systems by tailored bright illumination 2010 Lars Lydersen
Carlos Wiechers
Christoffer Wittmann
Dominique Elser
Johannes Skaar
Vadim Makarov
2
+ PDF Chat Simple Proof of Security of the BB84 Quantum Key Distribution Protocol 2000 Peter W. Shor
John Preskill
2
+ PDF Chat Experimental measurement-device-independent quantum key distribution with imperfect sources 2016 Zhiyuan Tang
Kejin Wei
Olinka Bedroya
Li Qian
Hoi‐Kwong Lo
2
+ PDF Chat Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems 2008 Yi Zhao
Chi‐Hang Fred Fung
Bing Qi
Christine Chen
Hoi‐Kwong Lo
2
+ PDF Chat Side-Channel-Free Quantum Key Distribution 2012 Samuel L. Braunstein
Stefano Pirandola
2
+ PDF Chat Finite-key analysis for measurement-device-independent quantum key distribution 2014 Marcos Curty
Feihu Xu
Wei Cui
Charles Ci Wen Lim
Kiyoshi Tamaki
Hoi‐Kwong Lo
2
+ PDF Chat Quantum Key Distribution with High Loss: Toward Global Secure Communication 2003 Won-Young Hwang
2
+ PDF Chat Full-field implementation of a perfect eavesdropper on a quantum cryptography system 2011 Ilja Gerhardt
Qin Liu
Antı́a Lamas-Linares
Johannes Skaar
Christian Kurtsiefer
Vadim Makarov
2
+ PDF Chat Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution 2014 Feihu Xu
He Xu
H.-K. Lo
2
+ PDF Chat Limitations on Practical Quantum Cryptography 2000 Gilles Brassard
Norbert Lütkenhaus
Tal Mor
Barry C. Sanders
1
+ PDF Chat Effect of source tampering in the security of quantum cryptography 2015 Shi‐Hai Sun
Feihu Xu
Mu-Sheng Jiang
Xiang-Chun Ma
Hoi‐Kwong Lo
Lin-Mei Liang
1
+ The DARPA Quantum Network 2018 Chip Elliott
1
+ PDF Chat Secure quantum key distribution 2014 Hoi‐Kwong Lo
Marcos Curty
Kiyoshi Tamaki
1
+ PDF Chat Device Calibration Impacts Security of Quantum Key Distribution 2011 Nitin Jain
Christoffer Wittmann
Lars Lydersen
Carlos Wiechers
Dominique Elser
Christoph Marquardt
Vadim Makarov
Gerd Leuchs
1
+ PDF Chat Quantum annealing in the transverse Ising model 1998 Tadashi Kadowaki
Hidetoshi Nishimori
1
+ PDF Chat Detection of entanglement in asymmetric quantum networks and multipartite quantum steering 2015 Daniel Cavalcanti
Paul Skrzypczyk
G. H. Aguilar
Ranieri Nery
P. H. Souto Ribeiro
S. P. Walborn
1
+ PDF Chat Sum-of-squares decompositions for a family of Clauser-Horne-Shimony-Holt-like inequalities and their application to self-testing 2015 Cédric Bamps
Stefano Pironio
1
+ PDF Chat Quantum principal component analysis 2014 Seth Lloyd
Masoud Mohseni
Patrick Rebentrost
1
+ PDF Chat Secrecy extraction from no-signaling correlations 2006 Valerio Scarani
Nicolas Gisin
Nicolas Brunner
Lluís Masanes
Sergi Pino
Antonio Acín
1
+ PDF Chat Robust self-testing of unknown quantum systems into any entangled two-qubit states 2013 Tzyh Haur Yang
Miguel Navascués
1
+ PDF Chat Multiparticle generalization of entanglement swapping 1998 Sougato Bose
Vlatko Vedral
P. L. Knight
1
+ PDF Chat Maximal Violation of the Collins-Gisin-Linden-Massar-Popescu Inequality for Infinite Dimensional States 2008 Stefan Zohren
Richard D. Gill
1
+ PDF Chat Information-theoretic security proof for quantum-key-distribution protocols 2005 Renato Renner
Nicolas Gisin
Barbara Kraus
1
+ PDF Chat Quantum cryptographic network based on quantum memories 1996 Eli Biham
B. Hüttner
Tal Mor
1
+ PDF Chat Superlinear threshold detectors in quantum cryptography 2011 Lars Lydersen
Nitin Jain
Christoffer Wittmann
Øystein Marøy
Johannes Skaar
Christoph Marquardt
Vadim Makarov
Gerd Leuchs
1
+ PDF Chat Quantum key distribution based on quantum dimension and independent devices 2014 Hong-Wei Li
Zhen‐Qiang Yin
Wei Chen
Shuang Wang
Guang‐Can Guo
Zheng‐Fu Han
1
+ PDF Chat Alternative schemes for measurement-device-independent quantum key distribution 2012 Xiongfeng Ma
Mohsen Razavi
1
+ Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres 2015 Bas Hensen
Hannes Bernien
A. Dréau
Andreas Reiserer
Norbert Kalb
Machiel Blok
Just Ruitenberg
R. F. L. Vermeulen
R. N. Schouten
Carlos Abellán
1
+ PDF Chat Experimental Realization of a Quantum Support Vector Machine 2015 Zhaokai Li
Xiaomei Liu
Nanyang Xu
Jiangfeng Du
1
+ PDF Chat Loss-tolerant quantum cryptography with imperfect sources 2014 Kiyoshi Tamaki
Marcos Curty
Go Kato
Hoi‐Kwong Lo
Koji Azuma
1
+ PDF Chat Phase-remapping attack in practical quantum-key-distribution systems 2007 Chi‐Hang Fred Fung
Bing Qi
Kiyoshi Tamaki
Hoi‐Kwong Lo
1
+ PDF Chat The Uncertainty Principle Determines the Nonlocality of Quantum Mechanics 2010 Jonathan Oppenheim
Stephanie Wehner
1
+ PDF Chat Device-Independent Security of Quantum Cryptography against Collective Attacks 2007 Antonio Acín
Nicolas Brunner
Nicolas Gisin
Serge Massar
Stefano Pironio
Valerio Scarani
1
+ PDF Chat <i>Colloquium</i>: The Einstein-Podolsky-Rosen paradox: From concepts to applications 2009 M. D. Reid
P. D. Drummond
Warwick P. Bowen
Eric G. Cavalcanti
Ping Koy Lam
Hans‐A. Bachor
Ulrik L. Andersen
Gerd Leuchs
1
+ PDF Chat Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution 2014 Zhiyuan Tang
Zhongfa Liao
Feihu Xu
Bing Qi
Li Qian
Hoi‐Kwong Lo
1
+ PDF Chat Discrete and continuous variables for measurement-device-independent quantum cryptography 2015 Feihu Xu
Marcos Curty
Bing Qi
Li Qian
Hoi‐Kwong Lo
1
+ PDF Chat Effects of detector efficiency mismatch on security of quantum cryptosystems 2006 Vadim Makarov
A. N. Anisimov
Johannes Skaar
1
+ PDF Chat Quantum nonlocality in two three-level systems 2002 Antonio Acín
Thomas Durt
Nicolas Gisin
José I. Latorre
1
+ PDF Chat Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks 2013 Allison Rubenok
Joshua A. Slater
Philip K. Chan
I. Lucio-Martinez
Wolfgang Tittel
1
+ PDF Chat A unified view on Hardyʼs paradox and the Clauser–Horne–Shimony–Holt inequality 2014 Laura Mančinska
Stephanie Wehner
1
+ PDF Chat A quantum access network 2013 B. Fröhlich
J. F. Dynes
Marco Lucamarini
A. W. Sharpe
Zhiliang Yuan
A. J. Shields
1
+ PDF Chat Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits 2013 Thiago Ferreira da Silva
Douglas Vitoreti
G. B. Xavier
Gustavo C. Amaral
Guilherme P. Temporão
Jean Pierre von der Weid
1