Device-independent security of quantum cryptography against collective attacks A Acín, N Brunner, N Gisin, S Massar, S Pironio, V Scarani Physical Review Letters 98 (23), 230501, 2007 | 1166 | 2007 |

Random numbers certified by Bell’s theorem S Pironio, A Acín, S Massar, AB de La Giroday, DN Matsukevich, P Maunz, ... Nature 464 (7291), 1021, 2010 | 1002 | 2010 |

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations V Scarani, A Acin, G Ribordy, N Gisin Physical review letters 92 (5), 057901, 2004 | 724 | 2004 |

From Bell’s theorem to secure quantum key distribution A Acin, N Gisin, L Masanes Physical review letters 97 (12), 120405, 2006 | 586 | 2006 |

Quantum cloning V Scarani, S Iblisdir, N Gisin, A Acin Reviews of Modern Physics 77 (4), 1225, 2005 | 569 | 2005 |

Almost all quantum states have nonclassical correlations A Ferraro, L Aolita, D Cavalcanti, FM Cucchietti, A Acin Physical Review A 81 (5), 052318, 2010 | 542 | 2010 |

Classification of mixed three-qubit states A Acin, D Bruß, M Lewenstein, A Sanpera Physical Review Letters 87 (4), 040401, 2001 | 532 | 2001 |

Generalized Schmidt decomposition and classification of three-quantum-bit states A Acín, A Andrianov, L Costa, E Jané, JI Latorre, R Tarrach Physical Review Letters 85 (7), 1560, 2000 | 460 | 2000 |

A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations M Navascués, S Pironio, A Acín New Journal of Physics 10 (7), 073013, 2008 | 446 | 2008 |

General properties of nonsignaling theories L Masanes, A Acín, N Gisin Physical Review A 73 (1), 012112, 2006 | 344 | 2006 |

Discriminating states: The quantum Chernoff bound KMR Audenaert, J Calsamiglia, R Munoz-Tapia, E Bagan, L Masanes, ... Physical review letters 98 (16), 160501, 2007 | 339 | 2007 |

Bounding the set of quantum correlations M Navascués, S Pironio, A Acín Physical Review Letters 98 (1), 010401, 2007 | 337 | 2007 |

Device-independent quantum key distribution secure against collective attacks S Pironio, A Acin, N Brunner, N Gisin, S Massar, V Scarani New Journal of Physics 11 (4), 045021, 2009 | 333 | 2009 |

Optimality of Gaussian attacks in continuous-variable quantum cryptography M Navascués, F Grosshans, A Acin Physical review letters 97 (19), 190502, 2006 | 333 | 2006 |

Quantum nonlocality in two three-level systems A Acin, T Durt, N Gisin, JI Latorre Physical Review A 65 (5), 052325, 2002 | 285 | 2002 |

Secure device-independent quantum key distribution with causally independent measurement devices L Masanes, S Pironio, A Acín Nature communications 2, 238, 2011 | 273 | 2011 |

Testing the dimension of Hilbert spaces N Brunner, S Pironio, A Acin, N Gisin, AA Méthot, V Scarani Physical review letters 100 (21), 210503, 2008 | 238 | 2008 |

Scaling laws for the decay of multiqubit entanglement L Aolita, R Chaves, D Cavalcanti, A Acín, L Davidovich Physical review letters 100 (8), 080501, 2008 | 235 | 2008 |

Statistical distinguishability between unitary operations A Acin Physical review letters 87 (17), 177901, 2001 | 228 | 2001 |

Bell-type test of energy-time entangled qutrits RT Thew, A Acin, H Zbinden, N Gisin Physical review letters 93 (1), 010503, 2004 | 223 | 2004 |