Loss-tolerant quantum cryptography with imperfect sources K Tamaki, M Curty, G Kato, HK Lo, K Azuma Physical Review A 90 (5), 052314, 2014 | 211 | 2014 |

Quantum key distribution with correlated sources M Pereira, G Kato, A Mizutani, M Curty, K Tamaki Science Advances 6 (37), eaaz4487, 2020 | 67 | 2020 |

Aggregating quantum repeaters for the quantum internet K Azuma, G Kato Physical Review A 96 (3), 032332, 2017 | 62 | 2017 |

Next-nearest-neighbour correlation functions of the spin-1/2 XXZ chain at the critical region G Kato, M Shiroishi, M Takahashi, K Sakai Journal of Physics A: Mathematical and General 36 (23), L337, 2003 | 50 | 2003 |

Versatile relative entropy bounds for quantum networks L Rigovacca, G Kato, S Bäuml, MS Kim, WJ Munro, K Azuma New Journal of Physics 20 (1), 013033, 2018 | 47 | 2018 |

Third-neighbour and other four-point correlation functions of spin-1/2 XXZ chain G Kato, M Shiroishi, M Takahashi, K Sakai Journal of Physics A: Mathematical and General 37 (19), 5097, 2004 | 46 | 2004 |

Tight finite-key security for twin-field quantum key distribution G Currás-Lorenzo, Á Navarrete, K Azuma, G Kato, M Curty, M Razavi npj Quantum Information 7 (1), 22, 2021 | 42 | 2021 |

Next nearest-neighbor correlation functions of the spin-1/2 XXZ chain at massive region M Takahashi, G Kato, M Shiroishi Journal of the Physical Society of Japan 73 (1), 245-253, 2004 | 37 | 2004 |

Linear programs for entanglement and key distribution in the quantum internet S Bäuml, K Azuma, G Kato, D Elkouss Communications Physics 3 (1), 55, 2020 | 33 | 2020 |

Quantum key distribution with setting-choice-independently correlated light sources A Mizutani, G Kato, K Azuma, M Curty, R Ikuta, T Yamamoto, N Imoto, ... npj Quantum Information 5 (1), 8, 2019 | 31 | 2019 |

Differential-phase-shift quantum-key-distribution protocol with a small number of random delays Y Hatakeyama, A Mizutani, G Kato, N Imoto, K Tamaki Physical review a 95 (4), 042301, 2017 | 28 | 2017 |

Modified BB84 quantum key distribution protocol robust to source imperfections M Pereira, G Currás-Lorenzo, Á Navarrete, A Mizutani, G Kato, M Curty, ... Physical Review Research 5 (2), 023065, 2023 | 24 | 2023 |

Concentration inequality using unconfirmed knowledge G Kato arXiv preprint arXiv:2002.04357, 2020 | 20 | 2020 |

Single-shot secure quantum network coding on butterfly network with free public communication M Owari, G Kato, M Hayashi Quantum Science and Technology 3 (1), 014001, 2017 | 19 | 2017 |

Application of a process calculus to security proofs of quantum protocols T Kubota, Y Kakutani, G Kato, Y Kawano, H Sakurada Proceedings of the International Conference on Foundations of Computer …, 2012 | 19 | 2012 |

Partition function for a one-dimensional δ-function Bose gas G Kato, M Wadati Physical Review E 63 (3), 036106, 2001 | 19 | 2001 |

Semi-automated verification of security proofs of quantum cryptographic protocols T Kubota, Y Kakutani, G Kato, Y Kawano, H Sakurada Journal of Symbolic Computation 73, 192-220, 2016 | 18 | 2016 |

Graphical representation of the partition function of a one-dimensional δ-function Bose gas G Kato, M Wadati Journal of Mathematical Physics 42 (10), 4883-4893, 2001 | 18 | 2001 |

Secrecy and robustness for active attack in secure network coding M Hayashi, M Owari, G Kato, N Cai 2017 IEEE International Symposium on Information Theory (ISIT), 1172-1176, 2017 | 17 | 2017 |

Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization K Tamaki, M Koashi, G Kato arXiv preprint arXiv:1208.1995, 2012 | 17 | 2012 |