scispace - formally typeset
J

Johannes Skaar

Researcher at University of Oslo

Publications -  117
Citations -  5479

Johannes Skaar is an academic researcher from University of Oslo. The author has contributed to research in topics: Quantum key distribution & Fiber Bragg grating. The author has an hindex of 32, co-authored 117 publications receiving 4909 citations. Previous affiliations of Johannes Skaar include The Graduate Center, CUNY & Norwegian University of Science and Technology.

Papers
More filters
Journal ArticleDOI

Hacking commercial quantum cryptography systems by tailored bright illumination

TL;DR: By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists in Europe have shown that it is possible to tracelessly steal the secret encryption key generated by such systems and thus compromise their security.
Journal ArticleDOI

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

TL;DR: It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
Journal ArticleDOI

On the synthesis of fiber Bragg gratings by layer peeling

TL;DR: It is found that the discrete layer-peeling algorithm is significantly faster and can be more stable than its continuous counterpart, whereas the continuous algorithm offers some advantages in flexibility.
Journal ArticleDOI

Effects of detector efficiency mismatch on security of quantum cryptosystems

TL;DR: For the Bennett-Brassard 1984 (BB84) protocol, it is shown that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough, Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%.
Journal ArticleDOI

Experimentally Faking the Violation of Bell's Inequalities

TL;DR: By demonstrating Bell inequality violations using classical light in common experimental arrangements, this work highlights why strict locality and efficiency conditions are not optional, particularly in security-related scenarios.