These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

132 related articles for article (PubMed ID: 16383884)

  • 1. No-switching quantum key distribution using broadband modulated coherent light.
    Lance AM; Symul T; Sharma V; Weedbrook C; Ralph TC; Lam PK
    Phys Rev Lett; 2005 Oct; 95(18):180503. PubMed ID: 16383884
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quantum key distribution using gaussian-modulated coherent states.
    Grosshans F; Van Assche G; Wenger J; Brouri R; Cerf NJ; Grangier P
    Nature; 2003 Jan; 421(6920):238-41. PubMed ID: 12529636
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A fiber-based quasi-continuous-wave quantum key distribution system.
    Shen Y; Chen Y; Zou H; Yuan J
    Sci Rep; 2014 Apr; 4():4563. PubMed ID: 24691409
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Quantum cloning of a coherent light state into an atomic quantum memory.
    Fiurásek J; Cerf NJ; Polzik ES
    Phys Rev Lett; 2004 Oct; 93(18):180501. PubMed ID: 15525141
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Gaussian entanglement distribution with gigahertz bandwidth.
    Ast S; Ast M; Mehmet M; Schnabel R
    Opt Lett; 2016 Nov; 41(21):5094-5097. PubMed ID: 27805703
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
    García-Patrón R; Cerf NJ
    Phys Rev Lett; 2006 Nov; 97(19):190503. PubMed ID: 17155606
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference.
    Gleim AV; Egorov VI; Nazarov YV; Smirnov SV; Chistyakov VV; Bannik OI; Anisimov AA; Kynev SM; Ivanova AE; Collins RJ; Kozlov SA; Buller GS
    Opt Express; 2016 Feb; 24(3):2619-33. PubMed ID: 26906834
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution.
    Liao Q; Wang Y; Huang D; Guo Y
    Opt Express; 2018 Aug; 26(16):19907-19920. PubMed ID: 30119310
    [TBL] [Abstract][Full Text] [Related]  

  • 10. High-performance long-distance discrete-modulation continuous-variable quantum key distribution.
    Tian Y; Zhang Y; Liu S; Wang P; Lu Z; Wang X; Li Y
    Opt Lett; 2023 Jun; 48(11):2953-2956. PubMed ID: 37262252
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Continuous-variable quantum key distribution with time-division dual-quadrature homodyne detection.
    Oh J; Cho J; Kevin Rhee JK
    Opt Express; 2023 Sep; 31(19):30669-30681. PubMed ID: 37710606
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum cryptography without switching.
    Weedbrook C; Lance AM; Bowen WP; Symul T; Ralph TC; Lam PK
    Phys Rev Lett; 2004 Oct; 93(17):170504. PubMed ID: 15525058
    [TBL] [Abstract][Full Text] [Related]  

  • 13. 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel.
    Wang C; Huang D; Huang P; Lin D; Peng J; Zeng G
    Sci Rep; 2015 Sep; 5():14607. PubMed ID: 26419413
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Lifting the bandwidth limit of optical homodyne measurement with broadband parametric amplification.
    Shaked Y; Michael Y; Vered RZ; Bello L; Rosenbluh M; Pe'er A
    Nat Commun; 2018 Feb; 9(1):609. PubMed ID: 29426909
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.
    Gehring T; Händchen V; Duhme J; Furrer F; Franz T; Pacher C; Werner RF; Schnabel R
    Nat Commun; 2015 Oct; 6():8795. PubMed ID: 26514280
    [TBL] [Abstract][Full Text] [Related]  

  • 17. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States.
    Bian Y; Huang L; Zhang Y
    Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Practical, high-speed Gaussian coherent state continuous variable quantum key distribution with real-time parameter monitoring, optimised slicing, and post-processed key distillation.
    Weerasinghe A; Alhussein M; Alderton A; Wonfor A; Penty R
    Sci Rep; 2023 Dec; 13(1):21543. PubMed ID: 38057348
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.