These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 15698158)

  • 1. Security bounds for continuous variables quantum key distribution.
    Navascués M; Acín A
    Phys Rev Lett; 2005 Jan; 94(2):020505. PubMed ID: 15698158
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum key distribution using gaussian-modulated coherent states.
    Grosshans F; Van Assche G; Wenger J; Brouri R; Cerf NJ; Grangier P
    Nature; 2003 Jan; 421(6920):238-41. PubMed ID: 12529636
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.
    Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF
    Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Applicability of Squeezed- and Coherent-State Continuous-Variable Quantum Key Distribution over Satellite Links.
    Derkach I; Usenko VC
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396248
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Continuous variable quantum cryptography using coherent states.
    Grosshans F; Grangier P
    Phys Rev Lett; 2002 Feb; 88(5):057902. PubMed ID: 11863782
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Optimality of Gaussian attacks in continuous-variable quantum cryptography.
    Navascués M; Grosshans F; Acín A
    Phys Rev Lett; 2006 Nov; 97(19):190502. PubMed ID: 17155605
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Experimental quantum key distribution with finite-key security analysis for noisy channels.
    Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P
    Nat Commun; 2013; 4():2363. PubMed ID: 24008848
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.
    Kraus B; Gisin N; Renner R
    Phys Rev Lett; 2005 Aug; 95(8):080501. PubMed ID: 16196841
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Monitoring of continuous-variable quantum key distribution system in real environment.
    Liu W; Peng J; Huang P; Huang D; Zeng G
    Opt Express; 2017 Aug; 25(16):19429-19443. PubMed ID: 29041137
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
    Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB
    Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security of quantum key distribution with coherent states and homodyne detection.
    Iblisdir S; Van Assche G; Cerf NJ
    Phys Rev Lett; 2004 Oct; 93(17):170502. PubMed ID: 15525056
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems.
    Zhang Z; Voss PL
    Opt Express; 2009 Jul; 17(14):12090-108. PubMed ID: 19582125
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security of distributed-phase-reference quantum key distribution.
    Moroder T; Curty M; Lim CC; Thinh le P; Zbinden H; Gisin N
    Phys Rev Lett; 2012 Dec; 109(26):260501. PubMed ID: 23368542
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.
    Leverrier A
    Phys Rev Lett; 2017 May; 118(20):200501. PubMed ID: 28581779
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Quantum key distillation from Gaussian states by Gaussian operations.
    Navascués M; Bae J; Cirac JI; Lewestein M; Sanpera A; Acín A
    Phys Rev Lett; 2005 Jan; 94(1):010502. PubMed ID: 15698055
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Continuous-variable source-device-independent quantum key distribution against general attacks.
    Zhang Y; Chen Z; Weedbrook C; Yu S; Guo H
    Sci Rep; 2020 Apr; 10(1):6673. PubMed ID: 32317691
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.