These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 15698158)

  • 21. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.
    Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH
    Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Device-independent security of quantum cryptography against collective attacks.
    Acín A; Brunner N; Gisin N; Massar S; Pironio S; Scarani V
    Phys Rev Lett; 2007 Jun; 98(23):230501. PubMed ID: 17677888
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Practical limitation for continuous-variable quantum cryptography using coherent States.
    Namiki R; Hirano T
    Phys Rev Lett; 2004 Mar; 92(11):117901. PubMed ID: 15089171
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Quantum cryptography as a retrodiction problem.
    Werner AH; Franz T; Werner RF
    Phys Rev Lett; 2009 Nov; 103(22):220504. PubMed ID: 20366080
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.
    Gehring T; Händchen V; Duhme J; Furrer F; Franz T; Pacher C; Werner RF; Schnabel R
    Nat Commun; 2015 Oct; 6():8795. PubMed ID: 26514280
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Postselection technique for quantum channels with applications to quantum cryptography.
    Christandl M; König R; Renner R
    Phys Rev Lett; 2009 Jan; 102(2):020504. PubMed ID: 19257257
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Security of continuous-variable quantum key distribution against general attacks.
    Leverrier A; García-Patrón R; Renner R; Cerf NJ
    Phys Rev Lett; 2013 Jan; 110(3):030502. PubMed ID: 23373907
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
    García-Patrón R; Cerf NJ
    Phys Rev Lett; 2006 Nov; 97(19):190503. PubMed ID: 17155606
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Private entanglement over arbitrary distances, even using noisy apparatus.
    Aschauer H; Briegel HJ
    Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Finite-key analysis for measurement-device-independent quantum key distribution.
    Curty M; Xu F; Cui W; Lim CC; Tamaki K; Lo HK
    Nat Commun; 2014 Apr; 5():3732. PubMed ID: 24776959
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States.
    Bian Y; Huang L; Zhang Y
    Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729
    [TBL] [Abstract][Full Text] [Related]  

  • 33. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Continuous variable quantum cryptography: beating the 3 dB loss limit.
    Silberhorn Ch; Ralph TC; Lütkenhaus N; Leuchs G
    Phys Rev Lett; 2002 Oct; 89(16):167901. PubMed ID: 12398756
    [TBL] [Abstract][Full Text] [Related]  

  • 35. No signaling and quantum key distribution.
    Barrett J; Hardy L; Kent A
    Phys Rev Lett; 2005 Jul; 95(1):010503. PubMed ID: 16090597
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source.
    Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A
    Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Security of quantum key distribution using d-level systems.
    Cerf NJ; Bourennane M; Karlsson A; Gisin N
    Phys Rev Lett; 2002 Mar; 88(12):127902. PubMed ID: 11909502
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Experimental measurement-device-independent quantum key distribution.
    Liu Y; Chen TY; Wang LJ; Liang H; Shentu GL; Wang J; Cui K; Yin HL; Liu NL; Li L; Ma X; Pelc JS; Fejer MM; Peng CZ; Zhang Q; Pan JW
    Phys Rev Lett; 2013 Sep; 111(13):130502. PubMed ID: 24116758
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Stable control of 10 dB two-mode squeezed vacuum states of light.
    Eberle T; Händchen V; Schnabel R
    Opt Express; 2013 May; 21(9):11546-53. PubMed ID: 23670011
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Measurement-device-independent quantum key distribution with modified coherent state.
    Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF
    Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.