Field test of quantum key distribution in the Tokyo QKD Network M Sasaki, M Fujiwara, H Ishizuka, W Klaus, K Wakui, M Takeoka, S Miki, ... Optics express 19 (11), 10387-10409, 2011 | 1293 | 2011 |
Security proof for quantum-key-distribution systems with threshold detectors T Tsurumaru, K Tamaki Physical Review A—Atomic, Molecular, and Optical Physics 78 (3), 032302, 2008 | 121 | 2008 |
Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths M Hayashi, T Tsurumaru New Journal of Physics 14 (9), 093014, 2012 | 104 | 2012 |
More efficient privacy amplification with less random seeds via dual universal hash function M Hayashi, T Tsurumaru IEEE Transactions on Information Theory 62 (4), 2213-2232, 2016 | 103 | 2016 |
Implementation of continuous-variable quantum key distribution with discrete modulation T Hirano, T Ichikawa, T Matsubara, M Ono, Y Oguri, R Namiki, K Kasai, ... Quantum Science and Technology 2 (2), 024010, 2017 | 69 | 2017 |
Dual universality of hash functions and its applications to quantum cryptography T Tsurumaru, M Hayashi IEEE transactions on information theory 59 (7), 4700-4717, 2013 | 68 | 2013 |
Quantum key distribution at 1550 nm using a pulse heralded single photon source A Soujaeff, T Nishioka, T Hasegawa, S Takeuchi, T Tsurumaru, K Sasaki, ... Optics express 15 (2), 726-734, 2007 | 62 | 2007 |
Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol T Tsurumaru Physical Review A—Atomic, Molecular, and Optical Physics 75 (6), 062319, 2007 | 56 | 2007 |
Exact minimum and maximum of yield with a finite number of decoy light intensities T Tsurumaru, A Soujaeff, S Takeuchi Physical Review A—Atomic, Molecular, and Optical Physics 77 (2), 022319, 2008 | 27 | 2008 |
Quantum cryptography communication system T Tsurumaru US Patent 8,155,318, 2012 | 21 | 2012 |
Tokyo QKD network and the evolution to secure photonic network M Sasaki, M Fujiwra, H Ishizuka, W Klaus, K Wakui, M Takeoka, A Tanaka, ... CLEO: Science and Innovations, JTuC1, 2011 | 21 | 2011 |
Leftover hashing from quantum error correction: unifying the two approaches to the security proof of quantum key distribution T Tsurumaru IEEE Transactions on Information Theory 66 (6), 3465-3484, 2020 | 20 | 2020 |
On topological terms in the O (3) nonlinear sigma model T Tsurumaru, I Tsutsui Physics Letters B 460 (1-2), 94-102, 1999 | 15 | 1999 |
Field demonstration of quantum key distribution in the Tokyo QKD Network M Fujiwara, H Ishizuka, S Miki, T Yamashita, Z Wang, A Tanaka, ... International Quantum Electronics Conference, I403, 2011 | 14 | 2011 |
Instantons, monopoles and the flux quantization in the Faddeev–Niemi decomposition T Tsurumaru, I Tsutsui, A Fujii Nuclear Physics B 589 (3), 659-668, 2000 | 13 | 2000 |
Squash operator and symmetry T Tsurumaru Physical Review A—Atomic, Molecular, and Optical Physics 81 (1), 012328, 2010 | 11 | 2010 |
Localized and extended states in one-dimensional disordered system: random-mass Dirac fermions K Takeda, T Tsurumaru, I Ichinose, M Kimura Nuclear Physics B 556 (3), 545-562, 1999 | 11 | 1999 |
Efficient privacy amplification algorithms for quantum key distribution T Asai, T Tsurumaru IEICE Technical Report; IEICE Tech. Rep. 110 (443), 327-332, 2011 | 10 | 2011 |
Implementable quantum-bit-string commitment protocol T Tsurumaru Physical Review A—Atomic, Molecular, and Optical Physics 71 (1), 012313, 2005 | 9 | 2005 |
Equivalence of three classical algorithms with quantum side information: Privacy amplification, error correction, and data compression T Tsurumaru IEEE Transactions on Information Theory 68 (2), 1016-1031, 2021 | 8 | 2021 |