These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

122 related articles for article (PubMed ID: 15698055)

  • 1. Quantum key distillation from Gaussian states by Gaussian operations.
    Navascués M; Bae J; Cirac JI; Lewestein M; Sanpera A; Acín A
    Phys Rev Lett; 2005 Jan; 94(1):010502. PubMed ID: 15698055
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Gaussian transformations and distillation of entangled Gaussian states.
    Fiurásek J
    Phys Rev Lett; 2002 Sep; 89(13):137904. PubMed ID: 12225066
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum key distribution using gaussian-modulated coherent states.
    Grosshans F; Van Assche G; Wenger J; Brouri R; Cerf NJ; Grangier P
    Nature; 2003 Jan; 421(6920):238-41. PubMed ID: 12529636
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Extremality of Gaussian quantum states.
    Wolf MM; Giedke G; Cirac JI
    Phys Rev Lett; 2006 Mar; 96(8):080502. PubMed ID: 16606161
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy.
    Christandl M; Ferrara R
    Phys Rev Lett; 2017 Dec; 119(22):220506. PubMed ID: 29286800
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Distilling Gaussian states with Gaussian operations is impossible.
    Eisert J; Scheel S; Plenio MB
    Phys Rev Lett; 2002 Sep; 89(13):137903. PubMed ID: 12225065
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security bounds for continuous variables quantum key distribution.
    Navascués M; Acín A
    Phys Rev Lett; 2005 Jan; 94(2):020505. PubMed ID: 15698158
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
    Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C
    Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Gaussification and entanglement distillation of continuous-variable systems: a unifying picture.
    Campbell ET; Eisert J
    Phys Rev Lett; 2012 Jan; 108(2):020501. PubMed ID: 22324662
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Practical, high-speed Gaussian coherent state continuous variable quantum key distribution with real-time parameter monitoring, optimised slicing, and post-processed key distillation.
    Weerasinghe A; Alhussein M; Alderton A; Wonfor A; Penty R
    Sci Rep; 2023 Dec; 13(1):21543. PubMed ID: 38057348
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Equivalence between two-qubit entanglement and secure key distribution.
    Acín A; Masanes L; Gisin N
    Phys Rev Lett; 2003 Oct; 91(16):167901. PubMed ID: 14611441
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Entanglement cost under positive-partial-transpose-preserving operations.
    Audenaert K; Plenio MB; Eisert J
    Phys Rev Lett; 2003 Jan; 90(2):027901. PubMed ID: 12570580
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quantum state majorization at the output of bosonic Gaussian channels.
    Mari A; Giovannetti V; Holevo AS
    Nat Commun; 2014 May; 5():3826. PubMed ID: 24806909
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.
    Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF
    Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Secure key from bound entanglement.
    Horodecki K; Horodecki M; Horodecki P; Oppenheim J
    Phys Rev Lett; 2005 Apr; 94(16):160502. PubMed ID: 15904201
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Security of continuous-variable quantum key distribution against general attacks.
    Leverrier A; García-Patrón R; Renner R; Cerf NJ
    Phys Rev Lett; 2013 Jan; 110(3):030502. PubMed ID: 23373907
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.