Decoy State Quantum Key Distribution HK Lo, X Ma, K Chen Physical Review Letters 94 (23), 230504, 2005 | 2281* | 2005 |

Unconditional security of quantum key distribution over arbitrarily long distances HK Lo, HF Chau science 283 (5410), 2050-2056, 1999 | 1913 | 1999 |

Measurement-device-independent quantum key distribution HK Lo, M Curty, B Qi Physical review letters 108 (13), 130503, 2012 | 1884 | 2012 |

How to share a quantum secret R Cleve, D Gottesman, HK Lo Physical review letters 83 (3), 648, 1999 | 1465 | 1999 |

Security of quantum key distribution with imperfect devices D Gottesman, HK Lo, N Lutkenhaus, J Preskill International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 136, 2004 | 1238 | 2004 |

Secure quantum key distribution HK Lo, M Curty, K Tamaki Nature Photonics 8 (8), 595-604, 2014 | 1058 | 2014 |

Practical decoy state for quantum key distribution X Ma, B Qi, Y Zhao, HK Lo Physical Review A 72 (1), 012326, 2005 | 1055 | 2005 |

Is quantum bit commitment really possible? HK Lo, HF Chau Physical Review Letters 78 (17), 3410, 1997 | 758 | 1997 |

Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity HK Lo Physical Review A 62 (1), 012313, 2000 | 714 | 2000 |

Secure quantum key distribution with realistic devices F Xu, X Ma, Q Zhang, HK Lo, JW Pan Reviews of Modern Physics 92 (2), 025002, 2020 | 711 | 2020 |

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems Y Zhao, CHF Fung, B Qi, C Chen, HK Lo Physical Review A 78 (4), 042333, 2008 | 627 | 2008 |

Efficient quantum key distribution scheme and a proof of its unconditional security HK Lo, HF Chau, M Ardehali Journal of Cryptology 18, 133-165, 2005 | 603 | 2005 |

Practical challenges in quantum key distribution E Diamanti, HK Lo, B Qi, Z Yuan npj Quantum Information 2 (1), 1-12, 2016 | 541 | 2016 |

Introduction to quantum computation and information HK Lo, T Spiller, S Popescu World Scientific, 1998 | 525 | 1998 |

Insecurity of quantum secure computations HK Lo Physical Review A 56 (2), 1154, 1997 | 491 | 1997 |

All-photonic quantum repeaters K Azuma, K Tamaki, HK Lo Nature communications 6 (1), 6787, 2015 | 486 | 2015 |

Time-shift attack in practical quantum cryptosystems B Qi, CHF Fung, HK Lo, X Ma arXiv preprint quant-ph/0512080, 2005 | 466 | 2005 |

Experimental quantum key distribution with decoy states Y Zhao, B Qi, X Ma, HK Lo, L Qian Physical review letters 96 (7), 070502, 2006 | 427 | 2006 |

Proof of security of quantum key distribution with two-way classical communications D Gottesman, HK Lo IEEE Transactions on Information Theory 49 (2), 457-475, 2003 | 405 | 2003 |

Finite-key analysis for measurement-device-independent quantum key distribution M Curty, F Xu, W Cui, CCW Lim, K Tamaki, HK Lo Nature communications 5 (1), 3732, 2014 | 385 | 2014 |