Web Server Statistics for VM's sites

Program started at Tue-05-Dec-2023 00:33.
Analysed requests from Sun-01-Oct-2023 00:01 to Tue-05-Dec-2023 00:00 (65.00 days).

General Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report contains overall statistics.

Figures in parentheses refer to the 7-day period ending 05-Dec-2023 00:33.

Successful requests: 3,295,609 (10,442)
Average successful requests per day: 50,702 (1,491)
Successful requests for pages: 1,105,058 (3,509)
Average successful requests for pages per day: 17,001 (501)
Failed requests: 784,604 (328,454)
Redirected requests: 16,156 (1,697)
Distinct files requested: 2,908,951 (1,584)
Distinct hosts served: 18,258 (2,598)
Corrupt logfile lines: 454
Data transferred: 227.68 gigabytes (5.86 gigabytes)
Average data transferred per day: 3.50 gigabytes (857.06 megabytes)

Monthly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each month.

Each unit (+) represents 20,000 requests for pages or part thereof.

monthreqspages 
Oct 20231852767618322+++++++++++++++++++++++++++++++
Nov 20231436941484689+++++++++++++++++++++++++
Dec 202359012047+

Busiest month: Oct 2023 (618,322 requests for pages).

Weekly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each week.

Each unit (+) represents 15,000 requests for pages or part thereof.

week beg.reqspages 
1/Oct/2333299534639+++
8/Oct/2336415496157+++++++
15/Oct/2335920559642++++
22/Oct/23562187268559++++++++++++++++++
29/Oct/23664212441823++++++++++++++++++++++++++++++
5/Nov/23875299174932++++++++++++
12/Nov/2311188620201++
19/Nov/23121284554+
26/Nov/23103743655+
3/Dec/233169896+

Busiest week: week beginning 29/Oct/23 (441,823 requests for pages).

Daily Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each day.

Each unit (+) represents 2,500 requests for pages or part thereof.

datereqspages 
24/Oct/238506044542++++++++++++++++++
25/Oct/238100544718++++++++++++++++++
26/Oct/238177345207+++++++++++++++++++
27/Oct/238237944424++++++++++++++++++
28/Oct/238679048224++++++++++++++++++++
    
29/Oct/238649350755+++++++++++++++++++++
30/Oct/235740654544++++++++++++++++++++++
31/Oct/239032754026++++++++++++++++++++++
1/Nov/239745761116+++++++++++++++++++++++++
2/Nov/2310354463450++++++++++++++++++++++++++
3/Nov/2310455568603++++++++++++++++++++++++++++
4/Nov/2312443089329++++++++++++++++++++++++++++++++++++
    
5/Nov/2310022465329+++++++++++++++++++++++++++
6/Nov/238331849559++++++++++++++++++++
7/Nov/236883241030+++++++++++++++++
8/Nov/23341546484+++
9/Nov/23268331732+
10/Nov/235341589174++++
11/Nov/23277801624+
    
12/Nov/23266851749+
13/Nov/23287084801++
14/Nov/23275095643+++
15/Nov/23232165699+++
16/Nov/2323621107+
17/Nov/232048701+
18/Nov/231358501+
    
19/Nov/231583532+
20/Nov/232143983+
21/Nov/231855532+
22/Nov/231922968+
23/Nov/231883489+
24/Nov/231339524+
25/Nov/231403526+
    
26/Nov/231519607+
27/Nov/231562432+
28/Nov/231736546+
29/Nov/231626457+
30/Nov/231199462+
1/Dec/231244490+
2/Dec/231488661+
    
3/Dec/231479364+
4/Dec/231690532+

Busiest day: 4/Nov/23 (89,329 requests for pages).

Daily Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each day of the week, summed over all the weeks in the report.

Each unit (+) represents 5,000 requests for pages or part thereof.

dayreqspages 
Sun380313153433+++++++++++++++++++++++++++++++
Mon370556148210++++++++++++++++++++++++++++++
Tue499566189282++++++++++++++++++++++++++++++++++++++
Wed418899143396+++++++++++++++++++++++++++++
Thu342407121694+++++++++++++++++++++++++
Fri875940153350+++++++++++++++++++++++++++++++
Sat407928195693++++++++++++++++++++++++++++++++++++++++

Hourly Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each hour of the day, summed over all the days in the report.

Each unit (+) represents 1,500 requests for pages or part thereof.

hourreqspages 
010252045199+++++++++++++++++++++++++++++++
116717253361++++++++++++++++++++++++++++++++++++
210332647545++++++++++++++++++++++++++++++++
311819046230+++++++++++++++++++++++++++++++
413111548612+++++++++++++++++++++++++++++++++
59639943979++++++++++++++++++++++++++++++
613400247215++++++++++++++++++++++++++++++++
712760549031+++++++++++++++++++++++++++++++++
828463547696++++++++++++++++++++++++++++++++
930625645806+++++++++++++++++++++++++++++++
1024786148889+++++++++++++++++++++++++++++++++
1114781347130++++++++++++++++++++++++++++++++
1211230545424+++++++++++++++++++++++++++++++
1311577547301++++++++++++++++++++++++++++++++
1411645144540++++++++++++++++++++++++++++++
1511021042767+++++++++++++++++++++++++++++
1612426042674+++++++++++++++++++++++++++++
1711918346546++++++++++++++++++++++++++++++++
1811528143607++++++++++++++++++++++++++++++
1911964544950++++++++++++++++++++++++++++++
2011537442220+++++++++++++++++++++++++++++
219875743180+++++++++++++++++++++++++++++
229542046257+++++++++++++++++++++++++++++++
238605444899++++++++++++++++++++++++++++++

Domain Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the countries of the computers which requested files.

Listing domains, sorted by the amount of traffic.

reqs%bytesdomain
3295609100%[unresolved numerical addresses]

Organisation Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the organisations of the computers which requested files.

Listing the top 20 organisations by the number of requests, sorted by the number of requests.

reqs%bytesorganisation
164295643.93%114
50248615.59%20
308089 8.40%52
285554 7.54%3
284235 7.52%23
54301 1.63%216.244
28022 0.64%44
20137 0.49%100
17400 0.46%217.113
17158 0.27%54
12616 0.32%65.108
9410 0.26%64.124
7857 0.17%50
7152 1.65%66.249
5362 0.41%47
5143 0.10%139.47
3461 0.10%173.252
2932 0.06%135.181
2373 0.18%85
2249 0.35%34
76716 9.95%[not listed: 1,597 organisations]

Host Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the computers which requested files.

Listing the top 50 hosts by the number of requests, sorted alphabetically.

reqs%byteshost
285302 7.53%3.224.220.101
50216915.56%20.69.113.160
283972 7.50%23.22.35.162
20245 0.49%44.230.252.91
7665 0.15%44.231.202.44
7684 0.15%50.112.160.3
20478 0.50%52.25.208.208
284916 7.52%52.70.240.171
7454 0.15%54.184.159.16
2002 0.04%64.62.202.82
1977 0.05%64.124.8.51
1386 0.04%64.124.8.99
12452 0.31%65.108.99.56
1388 0.38%66.249.64.99
1356 0.31%66.249.64.100
1358 0.28%66.249.64.101
20096 0.49%100.21.24.205
1228 0.03%114.119.128.22
1198 0.03%114.119.129.24
1226 0.03%114.119.129.25
1197 0.03%114.119.129.199
1206 0.03%114.119.130.167
1196 0.03%114.119.132.248
1199 0.03%114.119.135.32
1199 0.03%114.119.135.237
1217 0.03%114.119.136.8
1211 0.03%114.119.136.254
1209 0.03%114.119.137.70
1204 0.03%114.119.137.123
1202 0.03%114.119.138.170
1203 0.03%114.119.140.170
1197 0.03%114.119.140.175
1204 0.03%114.119.142.15
1209 0.03%114.119.142.43
1196 0.03%114.119.143.177
1205 0.03%114.119.145.188
1200 0.03%114.119.146.7
1197 0.03%114.119.146.142
1221 0.04%114.119.148.165
1204 0.03%114.119.151.152
1206 0.03%114.119.152.139
1207 0.03%114.119.153.93
1204 0.03%114.119.156.38
1204 0.03%114.119.156.250
1208 0.03%114.119.158.156
2449 0.05%135.181.78.178
5142 0.10%139.47.142.49
1625 157.90.182.30
1479 0.04%193.183.0.162
54297 1.63%216.244.66.243
173496055.83%[not listed: 18,208 hosts]

Referrer Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the referrers (where people followed links from, or pages which included this site's images).

Listing referring URLs with at least 20 requests, sorted by the number of requests.

reqsURL
9462http://www.vad1.com/lab/pictures.html
155  http://www.vad1.com/lab/pictures.html?fb_locale=es_LA
8487http://www.vad1.com/
6281http://www.vad1.com/stats/vad1.com.html
6161http://www.vad1.com/lab/
1863http://www.vad1.com/photo/dirty-scanner/
1818http://www.vad1.com/lab/people.html
1480https://www.google.com/
1319http://www.vad1.com/photo/dirty-scanner/ls2000-cleaning/
15  http://www.vad1.com/photo/dirty-scanner/ls2000-cleaning/?sa=X&ved=0CB4Q9QEwBGoVChMI0uWv9cj2xgIVBccUCh1IbAc7
964http://www.vad1.com/lab/pictures.html/
725http://www.vad1.com/c/qcomm/
711http://www.vad1.com/lab/publications.html
709http://www.vad1.com/lab/hacking-commercial-quantum-cryptography-2010/
620http://www.vad1.com/photo/family-archive/
619http://www.russia.no/
614http://www.rbkweb.no/forum/viewtopic.php
540http://www.vad1.com/photo/folldal/
486http://66.39.24.47/
15  http://66.39.24.47/?XDEBUG_SESSION_START=phpstorm
380http://www.vad1.com/lab/presentations/
335http://www.vad1.com/lab/pictures.html/hdehd
325http://www.vad1.com/lab/pictures.html/isis
308http://www.vad1.com/photo/stock/2000.html
308http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/pictures/20181220-lab-commune.jpg
268http://www.vad1.com/photo/stock/
261http://www.vad1.com/korean-blog/index-ru.html
251http://www.vad1.com/lab/pictures/
57  http://www.vad1.com/lab/pictures/?C=N;O=D
18  http://www.vad1.com/lab/pictures/?C=D%3BO=A
18  http://www.vad1.com/lab/pictures/?C=S;O=A
17  http://www.vad1.com/lab/pictures/?C=M
15  http://www.vad1.com/lab/pictures/?C=S
15  http://www.vad1.com/lab/pictures/?C=D;O=A
15  http://www.vad1.com/lab/pictures/?C=S;O=D
12  http://www.vad1.com/lab/pictures/?C=N;O=A
12  http://www.vad1.com/lab/pictures/?C=S&O=5vx63e
12  http://www.vad1.com/lab/pictures/?C=M;O=D
12  http://www.vad1.com/lab/pictures/?C=D%3BO=D
11  http://www.vad1.com/lab/pictures/?C=M;O=A
250http://www.vad1.com/lab/news-archive.html
248http://www.vad1.com/c/lqpc/
244http://www.vad1.com/photo/lights-trondheim/
242http://www.vad1.com/photo/stock/1999.html
241http://www.vad1.com/lab/pictures.html/iis
240http://www.vad1.com/photo/x-ray-exper.html
224http://www.vad1.com/lab/full-eavesdropping-2011/
223http://www.vad1.com/lab/pictures.html/hndhd
214http://fruitsofourlabour.blogspot.com/search
210http://www.vad1.com/photo/
201http://www.vad1.com/lab/other.html
199http://www.vad1.com/photo/foundview/art/
23  http://www.vad1.com/photo/foundview/art/?C=S;O=D
20  http://www.vad1.com/photo/foundview/art/?C=S
20  http://www.vad1.com/photo/foundview/art/?C=D;O=A
20  http://www.vad1.com/photo/foundview/art/?C=D;O=D
16  http://www.vad1.com/photo/foundview/art/?C=S&O=ih596g
16  http://www.vad1.com/photo/foundview/art/?C=S%3BO=D
16  http://www.vad1.com/photo/foundview/art/?C=D%3BO=D
12  http://www.vad1.com/photo/foundview/art/?C=M;O=A
189http://www.vad1.com/photo/stock/1998.html
188http://vad1.com/
183http://www.rosenborg.info/forum/viewtopic.php
179http://www.vad1.com/publications/
174http://www.vad1.com/lab/press/
169http://www.vad1.com/photo/folldal/index-ru.html
168http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/press/press/pictures/20160812-Lim-shows-APD-testing-setup-labQNC3301-1.jpg
166http://www.vad1.com/c/lqpc/6/
12  http://www.vad1.com/c/lqpc/6/?C=N%3BO=A
12  http://www.vad1.com/c/lqpc/6/?C=N;O=A
12  http://www.vad1.com/c/lqpc/6/?C=D;O=D
11  http://www.vad1.com/c/lqpc/6/?C=S;O=A
10  http://www.vad1.com/c/lqpc/6/?C=D;O=A
163http://www.vad1.com/c/lqpc/4/
15  http://www.vad1.com/c/lqpc/4/?C=S;O=A
12  http://www.vad1.com/c/lqpc/4/?O=D
12  http://www.vad1.com/c/lqpc/4/?C=M;O=A
12  http://www.vad1.com/c/lqpc/4/?O=A
12  http://www.vad1.com/c/lqpc/4/?C=D;O=D
161http://www.vad1.com/continfo.html
153http://www.vad1.com/bio.html
146http://www.vad1.com/spam.html
142http://www.vad1.com/hosting.html
131https://yandex.ru/
128http://rbkweb.no/forum/viewtopic.php
127http://www.vad1.com/tcp-throughput-limit.html
126http://www.vad1.com/c/lqpc/4/QRate-lab-manual-QKD-plug-and-play-v20200710.pdf
123http://www.vad1.com/lab/conferences.html
112http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
112http://www.vad1.com/c/qcommce/2021/Makarov/slides/
24  http://www.vad1.com/c/qcommce/2021/Makarov/slides/?C=N%3BO=D
22  http://www.vad1.com/c/qcommce/2021/Makarov/slides/?C=M%3BO=A
10  http://www.vad1.com/c/qcommce/2021/Makarov/slides/?C=D%3BO=A
111http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/
109http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
104http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
104http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
102http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/
102http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
101http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/
101http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/
101http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/
101http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/
100http://www.vad1.com/lab/pictures.html/people.html
100http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/
100http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
100http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
99http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/presentations/people.html
99http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
99http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/other.html
99http://www.vad1.com/lab/pictures.html/iisndndnhdn
99http://www.vad1.com/listfirm/
99http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
99http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/
98http://www.vad1.com/photo/lights-trondheim/pg2.html
98http://www.vad1.com/lab/pictures.html/hndhdkdnhdnd
97http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/presentations/press/
97http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
97http://www.vad1.com/lab/pictures.html/hdeirreer
97http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
97http://www.vad1.com/lab/pictures.html/hdeirreeeererhrnhrn
96http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
96http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
95http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
95http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
95http://www.vad1.com/photo/sky/
95http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
95http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/full-eavesdropping-2011/publications.html
95http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
95http://www.vad1.com/c/lqpc/1/
95http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
94http://www.vad1.com/photo/lights-trondheim/pg3.html
94http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/presentations/full-eavesdropping-2011/
94http://www.vad1.com/photo/esn/
94http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/people.html
94http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/people.html
93http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
93http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/press/conferences.html
93http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
93http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
93http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
92http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/
92http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/people.html
92http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
91http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
91http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/
91http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
91http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
91http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
91http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
90http://www.vad1.com/lab/pictures.html/press/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
90http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
90http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/
90http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/
90http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/publications.html
90http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
90http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
90http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
90http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/
90http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
90http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/
89http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
89http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/other.html
89http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/conferences.html
89http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
89http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
89http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
89http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/publications.html
89http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/conferences.html
89http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
89http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/press/people.html
89http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/
88http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/full-eavesdropping-2011/presentations/presentations/publications.html
88http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
88http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
88https://krakenmp.info/
88http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/people.html
88http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
88http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/conferences.html
88http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
88http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
88http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/
88http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
87http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/people.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/press/publications.html
87http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
87http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/other.html
87http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
87http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/publications.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
87http://www.vad1.com/c/qcommce/2021/Makarov/
12  http://www.vad1.com/c/qcommce/2021/Makarov/?O=D
12  http://www.vad1.com/c/qcommce/2021/Makarov/?C=S%3BO=A
12  http://www.vad1.com/c/qcommce/2021/Makarov/?C=M%3BO=A
12  http://www.vad1.com/c/qcommce/2021/Makarov/?O=A
11  http://www.vad1.com/c/qcommce/2021/Makarov/?C=N%3BO=D
87http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/other.html
87http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
87http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/
87http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
87http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
87http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/other.html
87http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
87http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/publications.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
86http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/full-eavesdropping-2011/people.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
86http://www.vad1.com/lab/pictures.html/presentations/press/presentations/press/press/press/press/other.html
86http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/press/press/hacking-commercial-quantum-cryptography-2010/other.html
86http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/publications.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
86http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
86http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
86http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
86http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/other.html
86http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/conferences.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
86http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
86http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/press/publications.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/publications.html
86http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
86http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
86http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
86http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
86http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/other.html
86http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/publications.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
85http://www.vad1.com/lab/pictures.html/press/presentations/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
85http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
85http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/conferences.html
85http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/conferences.html
85http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/publications.html
85http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/full-eavesdropping-2011/press/conferences.html
85http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
85http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/publications.html
85http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
85http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/publications.html
85http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/presentations/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/
85http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/other.html
85http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/publications.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/publications.html
85http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/publications.html
85http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
85http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
85http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/people.html
85http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
85http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/
84http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
84http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/press/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/publications.html
84http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
84http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/press/full-eavesdropping-2011/press/conferences.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/press/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
84http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/press/conferences.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
84http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
84http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/conferences.html
84http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
84http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/publications.html
84http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/press/
84http://www.vad1.com/lab/pictures.html/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/other.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
84http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/publications.html
84http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
84http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
84http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
84http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/presentations/full-eavesdropping-2011/conferences.html
84http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/publications.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
83http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/presentations/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
83http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
83http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
83http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
83http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
83http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/conferences.html
83http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
83http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/presentations/presentations/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/people.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/people.html
83http://www.vad1.com/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/press/press/press/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/press/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/press/publications.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/presentations/
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/people.html
83http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
83http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/publications.html
83http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
83http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
83http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
83http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
82http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
82http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
82http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/press/presentations/presentations/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/other.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
82http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
82http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
82http://www.vad1.com/lab/pictures.html/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/press/press/presentations/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/people.html
82http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/pictures/full-eavesdropping-2011/
82http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/press/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
82http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
82http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/press/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/other.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
82https://megapolis.sbs/
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/other.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
82http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
82http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/conferences.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/press/presentations/people.html
82http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/other.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/presentations/publications.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/presentations/
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/conferences.html
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
82http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
82http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/
82http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
82http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/press/full-eavesdropping-2011/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/press/press/conferences.html
81http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/conferences.html
81http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
81http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/people.html
81http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
81http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/presentations/presentations/people.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
81http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/publications.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/people.html
81http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/press/people.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
81http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
81http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/press/presentations/press/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/people.html
81http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/people.html
81http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/publications.html
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
81http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
81http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/full-eavesdropping-2011/publications.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/presentations/press/people.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/press/press/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/presentations/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/other.html
81http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
81http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/press/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/people.html
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
81http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
81http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/people.html
81http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
81http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
81http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/publications.html
81http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/press/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/other.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
81http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/full-eavesdropping-2011/other.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/publications.html
81http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
81http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/press/full-eavesdropping-2011/press/people.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/press/people.html
80http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/press/press/other.html
80http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/press/presentations/
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/press/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/other.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/press/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
80http://www.vad1.com/photo/ultimate-photo-shoot/group.html
80http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/press/press/publications.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/press/press/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/
80http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/presentations/people.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
80http://www.vad1.com/lab/pictures.html/press/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/presentations/press/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/conferences.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/other.html
80http://www.vad1.com/lab/pictures.html/press/presentations/presentations/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
80http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/publications.html
80http://www.vad1.com/lab/pictures.html/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/publications.html
80http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/people.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/other.html
80http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
80http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/other.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
80http://www.vad1.com/lab/pictures.html/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
80http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/press/press/
80http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/presentations/publications.html
80http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
80http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/presentations/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/other.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/press/
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/presentations/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/people.html
79http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/presentations/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/other.html
79http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/press/press/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/presentations/press/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/photo/moncal.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/
79http://www.vad1.com/lab/pictures.html/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/people.html
79http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
79http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/press/
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/full-eavesdropping-2011/presentations/press/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
79http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
79http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
79http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/
79http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/press/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/people.html
79http://www.vad1.com/lab/pictures.html/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/press/other.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
79http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/people.html
79http://www.vad1.com/lab/pictures.html/press/presentations/press/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
79http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/presentations/people.html
79http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/presentations/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/press/presentations/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
79https://mounjaro-ozempic.com/
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
79http://www.vad1.com/photo/stock/2003.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/other.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
79http://www.vad1.com/lab/pictures.html/presentations/press/press/full-eavesdropping-2011/presentations/press/press/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/publications.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
79http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
79http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
79http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/publications.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/conferences.html
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
79http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/people.html
79http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
79http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/presentations/presentations/people.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/press/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
78https://xn--80aaldytyc.xn--80adxhks/
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/publications.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/other.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/press/other.html
78http://www.vad1.com/lab/pictures.html/press/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/people.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/publications.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/press/press/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/press/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/people.html
78http://www.vad1.com/lab/pictures.html/presentations/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
78http://www.vad1.com/lab/pictures.html/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
78http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/press/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/press/press/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/full-eavesdropping-2011/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/press/publications.html
78http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/people.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/photo/stock/2001.html
78http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/press/presentations/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/press/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/press/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/people.html
78http://www.vad1.com/lab/pictures.html/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/press/full-eavesdropping-2011/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/press/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/people.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/conferences.html
78http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/
78http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
78http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
78http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/press/presentations/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/press/press/presentations/other.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/presentations/presentations/press/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/presentations/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/presentations/people.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/press/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
77http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
77http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/presentations/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/publications.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/conferences.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/presentations/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/press/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/presentations/people.html
77http://www.vad1.com/lab/pictures.html/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/other.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/people.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/press/presentations/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/presentations/press/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/presentations/press/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/people.html
77http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/full-eavesdropping-2011/press/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/press/presentations/
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/other.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/press/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
77http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/other.html
77http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/other.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
77http://www.vad1.com/lab/pictures.html/press/presentations/press/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/publications.html
77http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/presentations/presentations/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/press/press/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/press/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/press/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/press/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
77http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/other.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/press/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/presentations/full-eavesdropping-2011/press/conferences.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
77http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/conferences.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/presentations/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
77http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/people.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
77http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/conferences.html
77http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/press/other.html
77http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/press/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/press/publications.html
76http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/presentations/press/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/press/full-eavesdropping-2011/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/presentations/press/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
76http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/presentations/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/press/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/press/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/press/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/press/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/press/other.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
76http://www.vad1.com/lab/pictures.html/press/press/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/conferences.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/press/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/
76http://www.vad1.com/lab/pictures.html/presentations/press/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/conferences.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/press/press/other.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
76http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/presentations/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/presentations/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/press/press/hacking-commercial-quantum-cryptography-2010/press/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/press/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
76http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/presentations/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/publications.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
76http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
76http://www.vad1.com/listfirm/optcomp.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/other.html
76http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
76http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/other.html
76http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/people.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/press/press/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/
75http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/press/
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/presentations/presentations/press/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/press/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/press/press/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/press/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/people.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/press/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/press/
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/people.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/press/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75https://krakenmp.xyz/
75http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/press/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/full-eavesdropping-2011/press/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/people.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/press/other.html
75http://www.vad1.com/lab/pictures.html/press/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/press/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/presentations/press/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/press/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/press/presentations/press/
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/press/press/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/presentations/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/presentations/presentations/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/press/press/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
75http://www.vad1.com/lab/pictures.html/presentations/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/press/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/press/press/presentations/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/press/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/press/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
75http://www.vad1.com/lab/pictures.html/press/press/press/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/presentations/full-eavesdropping-2011/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/
75http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/people.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/conferences.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/other.html
75http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/people.html
75http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/presentations/other.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/conferences.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/people.html
75http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
75http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
75http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/presentations/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/presentations/press/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/people.html
74http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/press/presentations/press/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/press/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/other.html
74http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
74http://www.vad1.com/lab/pictures.html/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/press/presentations/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/full-eavesdropping-2011/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/other.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/presentations/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/other.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/press/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/press/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/press/presentations/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/press/conferences.html
74http://www.vad1.com/lab/pictures.html/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
74http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/other.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/
74http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/presentations/presentations/press/press/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/press/other.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/press/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/press/full-eavesdropping-2011/press/press/people.html
74http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/presentations/press/other.html
74http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/people.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/press/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/full-eavesdropping-2011/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/other.html
74http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/press/presentations/press/presentations/hacking-commercial-quantum-cryptography-2010/press/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/presentations/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/press/
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/conferences.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/press/press/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/press/press/hacking-commercial-quantum-cryptography-2010/press/presentations/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/full-eavesdropping-2011/presentations/press/other.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/presentations/press/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/press/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
74http://www.vad1.com/lab/pictures.html/presentations/full-eavesdropping-2011/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/press/press/press/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/people.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/conferences.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
74http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/press/press/press/other.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/presentations/presentations/publications.html
74http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/publications.html
74http://www.vad1.com/lab/pictures.html/presentations/hacking-commercial-quantum-cryptography-2010/press/press/press/full-eavesdropping-2011/presentations/presentations/conferences.html
74