| Loss-tolerant quantum cryptography with imperfect sources K Tamaki, M Curty, G Kato, HK Lo, K Azuma arXiv preprint arXiv:1312.3514, 2013 | 262 | 2013 |
| Quantum key distribution with correlated sources M Pereira, G Kato, A Mizutani, M Curty, K Tamaki Science Advances 6 (37), eaaz4487, 2020 | 108 | 2020 |
| Aggregating quantum repeaters for the quantum internet K Azuma, G Kato arXiv preprint arXiv:1606.00135, 2016 | 67 | 2016 |
| Tight finite-key security for twin-field quantum key distribution G Currás-Lorenzo, Á Navarrete, K Azuma, G Kato, M Curty, M Razavi npj Quantum Information 7 (1), 22, 2021 | 61 | 2021 |
| Modified BB84 quantum key distribution protocol robust to source imperfections M Pereira, G Currás-Lorenzo, Á Navarrete, A Mizutani, G Kato, M Curty, ... Physical Review Research 5 (2), 023065, 2023 | 55 | 2023 |
| Versatile relative entropy bounds for quantum networks L Rigovacca, G Kato, S Bäuml, MS Kim, WJ Munro, K Azuma New Journal of Physics 20 (1), 013033, 2018 | 50 | 2018 |
| Next-nearest-neighbour correlation functions of the spin-1/2 XXZ chain at the critical region G Kato, M Shiroishi, M Takahashi, K Sakai Journal of Physics A: Mathematical and General 36 (23), L337, 2003 | 50 | 2003 |
| Third-neighbour and other four-point correlation functions of spin-1/2 XXZ chain G Kato, M Shiroishi, M Takahashi, K Sakai Journal of Physics A: Mathematical and General 37 (19), 5097, 2004 | 46 | 2004 |
| Linear programs for entanglement and key distribution in the quantum internet S Bäuml, K Azuma, G Kato, D Elkouss Communications Physics 3 (1), 55, 2020 | 41 | 2020 |
| Next nearest-neighbor correlation functions of the spin-1/2 XXZ chain at massive region M Takahashi, G Kato, M Shiroishi Journal of the Physical Society of Japan 73 (1), 245-253, 2004 | 37 | 2004 |
| Concentration inequality using unconfirmed knowledge G Kato arXiv preprint arXiv:2002.04357, 2020 | 35 | 2020 |
| Quantum key distribution with setting-choice-independently correlated light sources A Mizutani, G Kato, K Azuma, M Curty, R Ikuta, T Yamamoto, N Imoto, ... npj Quantum Information 5 (1), 8, 2019 | 35 | 2019 |
| Differential-phase-shift quantum-key-distribution protocol with a small number of random delays Y Hatakeyama, A Mizutani, G Kato, N Imoto, K Tamaki Physical review a 95 (4), 042301, 2017 | 33 | 2017 |
| Application of a process calculus to security proofs of quantum protocols T Kubota, Y Kakutani, G Kato, Y Kawano, H Sakurada Proceedings of the International Conference on Foundations of Computer …, 2012 | 26 | 2012 |
| Single-shot secure quantum network coding on butterfly network with free public communication M Owari, G Kato, M Hayashi Quantum Science and Technology 3 (1), 014001, 2017 | 25 | 2017 |
| Partition function for a one-dimensional δ-function Bose gas G Kato, M Wadati Physical Review E 63 (3), 036106, 2001 | 21 | 2001 |
| A security framework for quantum key distribution implementations G Currás-Lorenzo, M Pereira, G Kato, M Curty, K Tamaki arXiv preprint arXiv:2305.05930, 2023 | 20 | 2023 |
| Semi-automated verification of security proofs of quantum cryptographic protocols T Kubota, Y Kakutani, G Kato, Y Kawano, H Sakurada Journal of Symbolic Computation 73, 192-220, 2016 | 20 | 2016 |
| Single-shot secure quantum network coding for general multiple unicast network with free one-way public communication G Kato, M Owari, M Hayashi IEEE Transactions on Information Theory 67 (7), 4564-4587, 2021 | 19 | 2021 |
| Security of quantum key distribution with iterative sifting K Tamaki, HK Lo, A Mizutani, G Kato, CCW Lim, K Azuma, M Curty Quantum Science and Technology 3 (1), 014002, 2017 | 19 | 2017 |