Publicacións en colaboración con investigadores/as de University of Toronto (33)

2023

  1. Fully Passive Quantum Key Distribution

    Physical Review Letters, Vol. 130, Núm. 22

2018

  1. Bifocal design procedure for dual-reflectarray antennas in offset configurations

    IEEE Antennas and Wireless Propagation Letters, Vol. 17, Núm. 8, pp. 1421-1425

  2. Bifocal technique applied to dual transmitarray antennas

    IET Conference Publications

  3. Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors

    New Journal of Physics, Vol. 20, Núm. 4

  4. Quantum cryptography with malicious devices

    Proceedings of SPIE - The International Society for Optical Engineering

  5. Secure quantum communication in the presence of phase- and polarization-dependent loss

    Physical Review A, Vol. 98, Núm. 4

  6. Security of quantum key distribution with iterative sifting

    Quantum Science and Technology, Vol. 3, Núm. 1

2017

  1. Application of bifocal concept to dual reflectarray configurations for multi-beam satellite antennas in Ka-band

    2017 11th European Conference on Antennas and Propagation, EUCAP 2017

  2. Quantum key distribution secure against partly malicious devices

    Optics InfoBase Conference Papers

  3. Study of bifocal dual reflectarray configurations for multi-beam antennas in ka-band

    2017 IEEE Antennas and Propagation Society International Symposium, Proceedings

  4. Synthesis of a Multi-beam Dual Reflectarray Antenna Using Genetic Algorithms

    2017 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION & USNC/URSI NATIONAL RADIO SCIENCE MEETING

2015

  1. Bridging the gap between theory and practice in quantum cryptography

    Proceedings of SPIE - The International Society for Optical Engineering

  2. Discrete and continuous variables for measurement-device-independent quantum cryptography

    Nature Photonics

  3. Measurement-device-independent quantum cryptography

    IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Núm. 3

2014

  1. Concise security bounds for practical decoy-state quantum key distribution

    Physical Review A - Atomic, Molecular, and Optical Physics, Vol. 89, Núm. 2

  2. Finite-key analysis for measurement-device-independent quantum key distribution

    Nature Communications, Vol. 5