Security verification for the physical implementation of a cryptography system is an important step to ensure the security level promised by theory. As has been shown many times, any physical device has characteristics and behavior that deviate from theoretical expectations. Frequently, those lead to new security loopholes. This thesis presents three experimental studies of attacks on quantum key distribution (QKD) systems. The first is the detection efficiency mismatch on free-space systems, which takes advantage of alignment imperfections in Bob's detector to control detection efficiencies. The experiment was done on a polarization-encoding free-space receiver to find the detection efficiencies of each detector for different spatial m...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to incr...
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electroni...
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfec...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. Howev...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Cryptography is essential for secure communication in the digital era. Today, public-key cryptograph...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
ABSTRACT: Quantum Key Distribution (QKD) is an automated method for distributing secret keys across ...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to incr...
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electroni...
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfec...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. Howev...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Cryptography is essential for secure communication in the digital era. Today, public-key cryptograph...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
ABSTRACT: Quantum Key Distribution (QKD) is an automated method for distributing secret keys across ...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to incr...
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electroni...
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfec...