These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

101 related articles for article (PubMed ID: 17155605)

  • 1. Optimality of Gaussian attacks in continuous-variable quantum cryptography.
    Navascués M; Grosshans F; Acín A
    Phys Rev Lett; 2006 Nov; 97(19):190502. PubMed ID: 17155605
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.
    Leverrier A
    Phys Rev Lett; 2017 May; 118(20):200501. PubMed ID: 28581779
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 5. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.
    Lodewyck J; Debuisschert T; García-Patrón R; Tualle-Brouri R; Cerf NJ; Grangier P
    Phys Rev Lett; 2007 Jan; 98(3):030503. PubMed ID: 17358671
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Monitoring of continuous-variable quantum key distribution system in real environment.
    Liu W; Peng J; Huang P; Huang D; Zeng G
    Opt Express; 2017 Aug; 25(16):19429-19443. PubMed ID: 29041137
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
    García-Patrón R; Cerf NJ
    Phys Rev Lett; 2006 Nov; 97(19):190503. PubMed ID: 17155606
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security bounds for continuous variables quantum key distribution.
    Navascués M; Acín A
    Phys Rev Lett; 2005 Jan; 94(2):020505. PubMed ID: 15698158
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Practical limitation for continuous-variable quantum cryptography using coherent States.
    Namiki R; Hirano T
    Phys Rev Lett; 2004 Mar; 92(11):117901. PubMed ID: 15089171
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Continuous variable quantum cryptography using coherent states.
    Grosshans F; Grangier P
    Phys Rev Lett; 2002 Feb; 88(5):057902. PubMed ID: 11863782
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Postselection technique for quantum channels with applications to quantum cryptography.
    Christandl M; König R; Renner R
    Phys Rev Lett; 2009 Jan; 102(2):020504. PubMed ID: 19257257
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Experimental quantum key distribution with finite-key security analysis for noisy channels.
    Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P
    Nat Commun; 2013; 4():2363. PubMed ID: 24008848
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security of continuous-variable quantum key distribution against general attacks.
    Leverrier A; García-Patrón R; Renner R; Cerf NJ
    Phys Rev Lett; 2013 Jan; 110(3):030502. PubMed ID: 23373907
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Device-independent security of quantum cryptography against collective attacks.
    Acín A; Brunner N; Gisin N; Massar S; Pironio S; Scarani V
    Phys Rev Lett; 2007 Jun; 98(23):230501. PubMed ID: 17677888
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 19. De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.
    Renner R; Cirac JI
    Phys Rev Lett; 2009 Mar; 102(11):110504. PubMed ID: 19392183
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
    Scarani V; Renner R
    Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.