These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

230 related articles for article (PubMed ID: 17155606)

  • 1. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.
    García-Patrón R; Cerf NJ
    Phys Rev Lett; 2006 Nov; 97(19):190503. PubMed ID: 17155606
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security of continuous-variable quantum key distribution against general attacks.
    Leverrier A; García-Patrón R; Renner R; Cerf NJ
    Phys Rev Lett; 2013 Jan; 110(3):030502. PubMed ID: 23373907
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Extremality of Gaussian quantum states.
    Wolf MM; Giedke G; Cirac JI
    Phys Rev Lett; 2006 Mar; 96(8):080502. PubMed ID: 16606161
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.
    Pirandola S; Braunstein SL; Lloyd S
    Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Continuous variable quantum cryptography using coherent states.
    Grosshans F; Grangier P
    Phys Rev Lett; 2002 Feb; 88(5):057902. PubMed ID: 11863782
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Insecurity of Detector-Device-Independent Quantum Key Distribution.
    Sajeed S; Huang A; Sun S; Xu F; Makarov V; Curty M
    Phys Rev Lett; 2016 Dec; 117(25):250505. PubMed ID: 28036200
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system.
    Lodewyck J; Debuisschert T; García-Patrón R; Tualle-Brouri R; Cerf NJ; Grangier P
    Phys Rev Lett; 2007 Jan; 98(3):030503. PubMed ID: 17358671
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure quantum key distribution using continuous variables of single photons.
    Zhang L; Silberhorn C; Walmsley IA
    Phys Rev Lett; 2008 Mar; 100(11):110504. PubMed ID: 18517770
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security Analysis of a Passive Continuous-Variable Quantum Key Distribution by Considering Finite-Size Effect.
    Xu S; Li Y; Wang Y; Mao Y; Wu X; Guo Y
    Entropy (Basel); 2021 Dec; 23(12):. PubMed ID: 34946004
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.
    Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH
    Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Practical continuous-variable quantum key distribution with composable security.
    Jain N; Chin HM; Mani H; Lupo C; Nikolic DS; Kordts A; Pirandola S; Pedersen TB; Kolb M; Ömer B; Pacher C; Gehring T; Andersen UL
    Nat Commun; 2022 Aug; 13(1):4740. PubMed ID: 35961965
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Finite-size security of continuous-variable quantum key distribution with digital signal processing.
    Matsuura T; Maeda K; Sasaki T; Koashi M
    Nat Commun; 2021 Jan; 12(1):252. PubMed ID: 33441559
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Enhancing Performance of Continuous-Variable Quantum Key Distribution (CV-QKD) and Gaussian Modulation of Coherent States (GMCS) in Free-Space Channels under Individual Attacks with Phase-Sensitive Amplifier (PSA) and Homodyne Detection (HD).
    Alshaer N; Ismail T; Mahmoud H
    Sensors (Basel); 2024 Aug; 24(16):. PubMed ID: 39204899
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.
    Leverrier A
    Phys Rev Lett; 2017 May; 118(20):200501. PubMed ID: 28581779
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Proof-of-Principle Demonstration of Fully Passive Quantum Key Distribution.
    Hu C; Wang W; Chan KS; Yuan Z; Lo HK
    Phys Rev Lett; 2023 Sep; 131(11):110801. PubMed ID: 37774309
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optimality of Gaussian attacks in continuous-variable quantum cryptography.
    Navascués M; Grosshans F; Acín A
    Phys Rev Lett; 2006 Nov; 97(19):190502. PubMed ID: 17155605
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.