default search action
Norbert Lütkenhaus
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Hao Hu, Jiyoung Im, Jie Lin, Norbert Lütkenhaus, Henry Wolkowicz:
Robust Interior Point Method for Quantum Key Distribution Rate Computation. Quantum 6: 792 (2022) - 2020
- [j9]Norbert Lütkenhaus, Ashutosh Marwah, Dave Touchette:
Erasable Bit Commitment From Temporary Quantum Trust. IEEE J. Sel. Areas Inf. Theory 1(2): 536-554 (2020)
2010 – 2019
- 2018
- [i7]Dave Touchette, Benjamin Lovitz, Norbert Lütkenhaus:
Practical Quantum Appointment Scheduling. CoRR abs/1801.02771 (2018) - 2017
- [i6]Piotr K. Tysowski, Xinhua Ling, Norbert Lütkenhaus, Michele Mosca:
The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD). CoRR abs/1712.02617 (2017) - 2014
- [j8]Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Länger, Norbert Lütkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John G. Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew J. Shields, Harald Weinfurter, Anton Zeilinger:
Using quantum key distribution for cryptographic purposes: A survey. Theor. Comput. Sci. 560: 62-81 (2014) - [c7]Romain Alléaume, Ivo Pietro Degiovanni, Alan Mink, Thomas E. Chapuran, Norbert Lütkenhaus, Momtchil Peev, Christopher J. Chunnilall, Vicente Martín, Marco Lucamarini, Martin Ward, Andrew J. Shields:
Worldwide standardization activity for quantum key distribution. GLOBECOM Workshops 2014: 656-661 - [c6]Juan Miguel Arrazola, Norbert Lütkenhaus:
Quantum Communication Complexity with Coherent States and Linear Optics. TQC 2014: 36-47 - 2013
- [i5]Oleg Gittsovich, Normand J. Beaudry, Varun Narasimhachar, Ruben Romero Alvarez, Tobias Moroder, Norbert Lütkenhaus:
Squashing model for detectors and applications to quantum key distribution protocols. CoRR abs/1310.5059 (2013) - 2012
- [j7]Xiongfeng Ma, Norbert Lütkenhaus:
Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD. Quantum Inf. Comput. 12(3-4): 203-214 (2012) - 2010
- [j6]Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alléaume, Norbert Lütkenhaus, Thomas Länger:
Security of trusted repeater quantum key distribution networks. J. Comput. Secur. 18(1): 61-87 (2010) - [p1]Norbert Lütkenhaus:
Tools for optical implementations of quantum communication protocols with application to quantum key distribution. Quantum Cryptography and Computing 2010: 31-40
2000 – 2009
- 2009
- [c5]Marcos Curty, Tobias Moroder, Xiongfeng Ma, Norbert Lütkenhaus:
Passive Decoy State Quantum Key Distribution. QuantumComm 2009: 132-141 - [c4]Douglas Stebila, Michele Mosca, Norbert Lütkenhaus:
The Case for Quantum Key Distribution. QuantumComm 2009: 283-296 - [i4]Romain Alléaume, Norbert Lütkenhaus, Renato Renner, Philippe Grangier, Thierry Debuisschert, Gregoire Ribordy, Nicolas Gisin, Philippe Painchault, Thomas Pornin, Louis Salvail, Michel Riguidel, Andrew J. Shields, Thomas Länger, Momtchil Peev, Mehrdad Dianati, Anthony Leverrier, Andreas Poppe, Jan Bouda, Cyril Branciard, Mark Godfrey, John G. Rarity, Harald Weinfurter, Anton Zeilinger, Christian Monyk:
Quantum key distribution and cryptography: a survey. Classical and Quantum Information Assurance Foundations and Practice 2009 - [i3]Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Lütkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney Van Meter, Atsuhiro Yamagishi, Yoshihisa Yamamoto, Akihiro Yamamura:
Updating Quantum Cryptography Report ver. 1. CoRR abs/0905.4325 (2009) - [i2]Douglas Stebila, Michele Mosca, Norbert Lütkenhaus:
The Case for Quantum Key Distribution. IACR Cryptol. ePrint Arch. 2009: 82 (2009) - 2008
- [c3]Norbert Lütkenhaus:
Theory of Quantum Key Distribution: The Road Ahead (Invited Talk). ICITS 2008: 120 - 2007
- [j5]Cyril Branciard, Nicolas Gisin, Norbert Lütkenhaus, Valerio Scarani:
Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography. Quantum Inf. Comput. 7(7): 639-664 (2007) - [j4]Marcos Curty, Lucy Liuxuan Zhang, Hoi-Kwong Lo, Norbert Lütkenhaus:
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states. Quantum Inf. Comput. 7(7): 665-688 (2007) - [i1]Romain Alléaume, Jan Bouda, Cyril Branciard, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Länger, Anthony Leverrier, Norbert Lütkenhaus, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John G. Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew J. Shields, Harald Weinfurter, Anton Zeilinger:
SECOQC White Paper on Quantum Key Distribution and Cryptography. CoRR abs/quant-ph/0701168 (2007) - 2006
- [j3]Norbert Lütkenhaus:
Secret keys from quantum correlations. Inform. Forsch. Entwickl. 21(1-2): 29-37 (2006) - 2004
- [j2]Daniel Gottesman, Hoi-Kwong Lo, Norbert Lütkenhaus, John Preskill:
Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4(5): 325-360 (2004) - [c2]Daniel Gottesman, Hoi-Kwong Lo, Norbert Lütkenhaus, John Preskill:
Security of quantum key distribution with imperfect devices. ISIT 2004: 136 - 2000
- [j1]Dagmar Bruß, Norbert Lütkenhaus:
Quantum Key Distribution: from Principles to Practicalities. Appl. Algebra Eng. Commun. Comput. 10(4/5): 383-399 (2000) - [c1]Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders:
Security Aspects of Practical Quantum Cryptography. EUROCRYPT 2000: 289-299
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint