Marcos Curty
Identifiers
- name variant Marcos Curty 0.60 · backfill
Papers (48)
- Numerical security analysis for practical quantum key distribution quant-ph · 2026 · author #4
- Security of decoy-state quantum key distribution with correlated bit-and-basis encoders quant-ph · 2026 · author #5
- Device-independent quantum cryptography with input leakage quant-ph · 2026 · author #2
- Reference-Beam Attacks against Twin-Field Quantum Key Distribution using Optical Injection Locking quant-ph · 2025 · author #7
- Geometrical constructions of purity testing protocols and their applications to quantum communication quant-ph · 2025 · author #4
- Intensity correlations in decoy-state BB84 quantum key distribution systems quant-ph · 2024 · author #5
- Security proof for a simplified BB84-like QKD protocol quant-ph · 2018 · author #3
- Secure quantum communication in the presence of phase and polarization dependent loss quant-ph · 2018 · author #2
- Finite-key security analysis for quantum key distribution with leaky sources quant-ph · 2018 · author #3
- Decoy-state quantum key distribution with a leaky source quant-ph · 2018 · author #2
- Measurement-Device-Independent Quantum Digital Signatures quant-ph · 2017 · author #4
- Experimental measurement-device-independent quantum digital signatures over a metropolitan network quant-ph · 2017 · author #17
- Insecurity of detector-device-independent quantum key distribution quant-ph · 2016 · author #6
- Discrete-variable measurement-device-independent quantum key distribution suitable for metropolitan networks quant-ph · 2015 · author #2
- Secure Quantum Key Distribution quant-ph · 2015 · author #2
- Finite-key security analysis of quantum key distribution with imperfect light sources quant-ph · 2015 · author #2
- Measurement-device-independent quantum cryptography quant-ph · 2014 · author #2
- Loss-tolerant quantum cryptography with imperfect sources quant-ph · 2013 · author #2
- Concise Security Bounds for Practical Decoy-State Quantum Key Distribution quant-ph · 2013 · author #2
- Finite-key analysis for measurement-device-independent quantum key distribution quant-ph · 2013 · author #1
- Experimental unconditionally secure bit commitment quant-ph · 2013 · author #3
- Practical aspects of measurement-device-independent quantum key distribution quant-ph · 2013 · author #2
- Security of distributed-phase-reference quantum key distribution quant-ph · 2012 · author #2
- Measurement-device-independent quantum key distribution quant-ph · 2011 · author #2
- Heralded qubit amplifiers for practical device-independent quantum key distribution quant-ph · 2011 · author #1
- Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals quant-ph · 2010 · author #1
- Passive decoy state quantum key distribution with practical light sources quant-ph · 2009 · author #1
- Implementation of two-party protocols in the noisy-storage model quant-ph · 2009 · author #2
- Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution quant-ph · 2009 · author #1
- Upper bounds for the secure key rate of decoy state quantum key distribution quant-ph · 2009 · author #1
- Detector decoy quantum key distribution quant-ph · 2008 · author #2
- Comment on "Arbitrated quantum-signature scheme" quant-ph · 2008 · author #1
- Upper bounds on the performance of differential-phase-shift quantum key distribution quant-ph · 2008 · author #2
- Effect of detector dead-times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks quant-ph · 2008 · author #1
- On single-photon quantum key distribution in the presence of loss quant-ph · 2006 · author #1
- Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states quant-ph · 2006 · author #1
- One-way quantum key distribution: Simple upper bound on the secret key rate quant-ph · 2006 · author #2
- Experimentally realizable quantum comparison of coherent states and its applications quant-ph · 2006 · author #2
- Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors quant-ph · 2005 · author #2
- Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses quant-ph · 2004 · author #1
- Detecting two-party quantum correlations in quantum key distribution protocols quant-ph · 2004 · author #1
- Practical quantum key distribution: On the security evaluation with inefficient single-photon detectors quant-ph · 2003 · author #1
- Entanglement as precondition for secure quantum key distribution quant-ph · 2003 · author #1
- Quantum authentication with unitary coding sets quant-ph · 2002 · author #2
- Qubit authentication quant-ph · 2001 · author #1
- Quantum authentication of classical messages quant-ph · 2001 · author #1
- Quantum cryptography without a quantum channel quant-ph · 2001 · author #1
- Quantum information processing: A linear systems perspective quant-ph · 2001 · author #1
Mentions
- 0911.2815 #1 · backfill · confidence 0.70 Marcos Curty
- 0911.2302 #2 · backfill · confidence 0.70 Marcos Curty
- 0909.5519 #1 · backfill · confidence 0.70 Marcos Curty
- 0901.4669 #1 · backfill · confidence 0.70 Marcos Curty
- 0811.0027 #2 · backfill · confidence 0.70 Marcos Curty
- 0806.0858 #2 · backfill · confidence 0.70 Marcos Curty
- 0806.0854 #1 · backfill · confidence 0.70 Marcos Curty
- 0803.1473 #1 · backfill · confidence 0.70 Marcos Curty
Frequent Coauthors
- Hoi-Kwong Lo 12 shared papers
- Norbert L\"utkenhaus 12 shared papers
- Tobias Moroder 10 shared papers
- Kiyoshi Tamaki 8 shared papers
- Feihu Xu 7 shared papers
- Bing Qi 5 shared papers
- David J. Santos 5 shared papers
- Xiongfeng Ma 5 shared papers
- Charles Ci Wen Lim 4 shared papers
- Erika Andersson 3 shared papers
- Hugo Zbinden 3 shared papers
- Alessandro Marcomini 2 shared papers
- Anqi Huang 2 shared papers
- Davide Rusca 2 shared papers
- Esther Perez 2 shared papers
- Guillermo Curr\'as-Lorenzo 2 shared papers
- Ittoop Vergheese Puthoor 2 shared papers
- Jian-Wei Pan 2 shared papers
- Maciej Lewenstein 2 shared papers
- Margarida Pereira 2 shared papers