Search filters

List of works by Marcos Curty

Bridging the gap between theory and practice in quantum cryptography

scholarly article published 13 October 2015

Comment on “Arbitrated quantum-signature scheme”

Compact optical sources for quantum communications

Complete hierarchies of efficient approximations to problems in entanglement theory

article by Jens Eisert et al published 21 December 2004 in Physical Review A

Concise security bounds for practical decoy-state quantum key distribution

scientific article published on 10 February 2014

Decoy-state quantum key distribution with a leaky source

Detecting quantum correlations for quantum key distribution

Detecting two-party quantum correlations in quantum-key-distribution protocols

article by Marcos Curty et al published 11 February 2005 in Physical Review A

Detector decoy quantum key distribution

Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

Entanglement as a Precondition for Secure Quantum Key Distribution

scientific article published in Physical Review Letters

Experimental Unconditionally Secure Bit Commitment

scientific article published on 10 January 2014

Experimental measurement-device-independent quantum digital signatures over a metropolitan network

Experimentally realizable quantum comparison of coherent states and its applications

Finite-key analysis for measurement-device-independent quantum key distribution

scientific article published on 29 April 2014

Finite-key security analysis of quantum key distribution with imperfect light sources

scientific article published on 10 September 2015

Heralded-qubit amplifiers for practical device-independent quantum key distribution

Implementation of two-party protocols in the noisy-storage model

scientific article (publication date: 25 May 2010)

Insecurity of Detector-Device-Independent Quantum Key Distribution

scientific article published on 16 December 2016

Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses

Know your enemy

2014 scholarly article by Marcos Curty

Measurement-Device-Independent Quantum Cryptography

scholarly article by Feihu Xu et al published May 2015 in IEEE Journal of Selected Topics in Quantum Electronics

Measurement-Device-Independent Quantum Key Distribution

scientific article published on 30 March 2012

Measurement-device-independent quantum digital signatures

One-way quantum key distribution: Simple upper bound on the secret key rate

Passive Decoy-State Quantum Key Distribution with Coherent Light

Passive decoy-state quantum key distribution with practical light sources

Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals

Practical Measurement Device Independent Quantum Key Distribution

scientific article published in 2013

Practical aspects of measurement-device-independent quantum key distribution

Quantum authentication of classical messages

Quantum authentication with unitary coding sets

Quantum key distribution with correlated sources

scientific article published on 09 September 2020

Qubit authentication

Secure quantum key distribution

Security of Distributed-Phase-Reference Quantum Key Distribution

scientific article published on 26 December 2012

Single-photon quantum key distribution in the presence of loss

True random numbers from amplified quantum vacuum

scientific article published in October 2011

Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode

scientific article

Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors

Upper bounds for the secure key rate of the decoy-state quantum key distribution