pith. machine review for the scientific record. sign in

Marcos Curty

Identifiers

  • name variant Marcos Curty 0.60 · backfill

Papers (48)

  1. Numerical security analysis for practical quantum key distribution quant-ph · 2026 · author #4
  2. Security of decoy-state quantum key distribution with correlated bit-and-basis encoders quant-ph · 2026 · author #5
  3. Device-independent quantum cryptography with input leakage quant-ph · 2026 · author #2
  4. Reference-Beam Attacks against Twin-Field Quantum Key Distribution using Optical Injection Locking quant-ph · 2025 · author #7
  5. Geometrical constructions of purity testing protocols and their applications to quantum communication quant-ph · 2025 · author #4
  6. Intensity correlations in decoy-state BB84 quantum key distribution systems quant-ph · 2024 · author #5
  7. Security proof for a simplified BB84-like QKD protocol quant-ph · 2018 · author #3
  8. Secure quantum communication in the presence of phase and polarization dependent loss quant-ph · 2018 · author #2
  9. Finite-key security analysis for quantum key distribution with leaky sources quant-ph · 2018 · author #3
  10. Decoy-state quantum key distribution with a leaky source quant-ph · 2018 · author #2
  11. Measurement-Device-Independent Quantum Digital Signatures quant-ph · 2017 · author #4
  12. Experimental measurement-device-independent quantum digital signatures over a metropolitan network quant-ph · 2017 · author #17
  13. Insecurity of detector-device-independent quantum key distribution quant-ph · 2016 · author #6
  14. Discrete-variable measurement-device-independent quantum key distribution suitable for metropolitan networks quant-ph · 2015 · author #2
  15. Secure Quantum Key Distribution quant-ph · 2015 · author #2
  16. Finite-key security analysis of quantum key distribution with imperfect light sources quant-ph · 2015 · author #2
  17. Measurement-device-independent quantum cryptography quant-ph · 2014 · author #2
  18. Loss-tolerant quantum cryptography with imperfect sources quant-ph · 2013 · author #2
  19. Concise Security Bounds for Practical Decoy-State Quantum Key Distribution quant-ph · 2013 · author #2
  20. Finite-key analysis for measurement-device-independent quantum key distribution quant-ph · 2013 · author #1
  21. Experimental unconditionally secure bit commitment quant-ph · 2013 · author #3
  22. Practical aspects of measurement-device-independent quantum key distribution quant-ph · 2013 · author #2
  23. Security of distributed-phase-reference quantum key distribution quant-ph · 2012 · author #2
  24. Measurement-device-independent quantum key distribution quant-ph · 2011 · author #2
  25. Heralded qubit amplifiers for practical device-independent quantum key distribution quant-ph · 2011 · author #1
  26. Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals quant-ph · 2010 · author #1
  27. Passive decoy state quantum key distribution with practical light sources quant-ph · 2009 · author #1
  28. Implementation of two-party protocols in the noisy-storage model quant-ph · 2009 · author #2
  29. Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution quant-ph · 2009 · author #1
  30. Upper bounds for the secure key rate of decoy state quantum key distribution quant-ph · 2009 · author #1
  31. Detector decoy quantum key distribution quant-ph · 2008 · author #2
  32. Comment on "Arbitrated quantum-signature scheme" quant-ph · 2008 · author #1
  33. Upper bounds on the performance of differential-phase-shift quantum key distribution quant-ph · 2008 · author #2
  34. Effect of detector dead-times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks quant-ph · 2008 · author #1
  35. On single-photon quantum key distribution in the presence of loss quant-ph · 2006 · author #1
  36. Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states quant-ph · 2006 · author #1
  37. One-way quantum key distribution: Simple upper bound on the secret key rate quant-ph · 2006 · author #2
  38. Experimentally realizable quantum comparison of coherent states and its applications quant-ph · 2006 · author #2
  39. Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors quant-ph · 2005 · author #2
  40. Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses quant-ph · 2004 · author #1
  41. Detecting two-party quantum correlations in quantum key distribution protocols quant-ph · 2004 · author #1
  42. Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors quant-ph · 2003 · author #1
  43. Entanglement as precondition for secure quantum key distribution quant-ph · 2003 · author #1
  44. Quantum authentication with unitary coding sets quant-ph · 2002 · author #2
  45. Qubit authentication quant-ph · 2001 · author #1
  46. Quantum authentication of classical messages quant-ph · 2001 · author #1
  47. Quantum cryptography without a quantum channel quant-ph · 2001 · author #1
  48. Quantum information processing: A linear systems perspective quant-ph · 2001 · author #1

Mentions

  • 0911.2815 #1 · backfill · confidence 0.70 Marcos Curty
  • 0911.2302 #2 · backfill · confidence 0.70 Marcos Curty
  • 0909.5519 #1 · backfill · confidence 0.70 Marcos Curty
  • 0901.4669 #1 · backfill · confidence 0.70 Marcos Curty
  • 0811.0027 #2 · backfill · confidence 0.70 Marcos Curty
  • 0806.0858 #2 · backfill · confidence 0.70 Marcos Curty
  • 0806.0854 #1 · backfill · confidence 0.70 Marcos Curty
  • 0803.1473 #1 · backfill · confidence 0.70 Marcos Curty

Frequent Coauthors