These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

200 related articles for article (PubMed ID: 11801170)

  • 1. Private entanglement over arbitrary distances, even using noisy apparatus.
    Aschauer H; Briegel HJ
    Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Simple proof of security of the BB84 quantum key distribution protocol.
    Shor PW; Preskill J
    Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Entanglement-based secure quantum cryptography over 1,120 kilometres.
    Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
    Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
    Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C
    Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fully device-independent quantum key distribution.
    Vazirani U; Vidick T
    Phys Rev Lett; 2014 Oct; 113(14):140501. PubMed ID: 25325625
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Experimental quantum key distribution with finite-key security analysis for noisy channels.
    Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P
    Nat Commun; 2013; 4():2363. PubMed ID: 24008848
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Limitations on quantum key repeaters.
    Bäuml S; Christandl M; Horodecki K; Winter A
    Nat Commun; 2015 Apr; 6():6908. PubMed ID: 25903096
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Device-independent quantum secure direct communication against collective attacks.
    Zhou L; Sheng YB; Long GL
    Sci Bull (Beijing); 2020 Jan; 65(1):12-20. PubMed ID: 36659063
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Experimental entanglement purification of arbitrary unknown states.
    Pan JW; Gasparoni S; Ursin R; Weihs G; Zeilinger A
    Nature; 2003 May; 423(6938):417-22. PubMed ID: 12761543
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.
    Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH
    Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Postselection technique for quantum channels with applications to quantum cryptography.
    Christandl M; König R; Renner R
    Phys Rev Lett; 2009 Jan; 102(2):020504. PubMed ID: 19257257
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Experimental purification of two-atom entanglement.
    Reichle R; Leibfried D; Knill E; Britton J; Blakestad RB; Jost JD; Langer C; Ozeri R; Seidelin S; Wineland DJ
    Nature; 2006 Oct; 443(7113):838-41. PubMed ID: 17051214
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Efficient multiuser quantum cryptography network based on entanglement.
    Xue P; Wang K; Wang X
    Sci Rep; 2017 Apr; 7():45928. PubMed ID: 28374854
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cryptography from noisy storage.
    Wehner S; Schaffner C; Terhal BM
    Phys Rev Lett; 2008 Jun; 100(22):220502. PubMed ID: 18643410
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Parallel Device-Independent Quantum Key Distribution.
    Jain R; Miller CA; Shi Y
    IEEE Trans Inf Theory; 2020; 66(9):. PubMed ID: 33654327
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Experimental eavesdropping based on optimal quantum cloning.
    Bartkiewicz K; Lemr K; Cernoch A; Soubusta J; Miranowicz A
    Phys Rev Lett; 2013 Apr; 110(17):173601. PubMed ID: 23679725
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Fundamental limits of repeaterless quantum communications.
    Pirandola S; Laurenza R; Ottaviani C; Banchi L
    Nat Commun; 2017 Apr; 8():15043. PubMed ID: 28443624
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.