These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
157 related articles for article (PubMed ID: 17375143)
1. Secure quantum key distribution with a single not-so-weak coherent pulse. Kim CM; Kim YW; Park YJ Opt Lett; 2007 Apr; 32(8):888-90. PubMed ID: 17375143 [TBL] [Abstract][Full Text] [Related]
2. Measurement-device-independent quantum key distribution with modified coherent state. Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231 [TBL] [Abstract][Full Text] [Related]
3. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement. Li W; Wang L; Zhao S Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069 [TBL] [Abstract][Full Text] [Related]
4. Quantum key distribution with blind polarization bases. Kye WH; Kim CM; Kim MS; Park YJ Phys Rev Lett; 2005 Jul; 95(4):040501. PubMed ID: 16090787 [TBL] [Abstract][Full Text] [Related]
5. Security of quantum key distribution with multiphoton components. Yin HL; Fu Y; Mao Y; Chen ZB Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014 [TBL] [Abstract][Full Text] [Related]
9. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing. Chen X; Chen L; Yan Y Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118 [TBL] [Abstract][Full Text] [Related]
10. Practical quantum key distribution protocol without monitoring signal disturbance. Sasaki T; Yamamoto Y; Koashi M Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060 [TBL] [Abstract][Full Text] [Related]
11. Satellite-to-ground quantum key distribution. Liao SK; Cai WQ; Liu WY; Zhang L; Li Y; Ren JG; Yin J; Shen Q; Cao Y; Li ZP; Li FZ; Chen XW; Sun LH; Jia JJ; Wu JC; Jiang XJ; Wang JF; Huang YM; Wang Q; Zhou YL; Deng L; Xi T; Ma L; Hu T; Zhang Q; Chen YA; Liu NL; Wang XB; Zhu ZC; Lu CY; Shu R; Peng CZ; Wang JY; Pan JW Nature; 2017 Sep; 549(7670):43-47. PubMed ID: 28825707 [TBL] [Abstract][Full Text] [Related]
12. Quantum key distribution with hacking countermeasures and long term field trial. Dixon AR; Dynes JF; Lucamarini M; Fröhlich B; Sharpe AW; Plews A; Tam W; Yuan ZL; Tanizawa Y; Sato H; Kawamura S; Fujiwara M; Sasaki M; Shields AJ Sci Rep; 2017 May; 7(1):1978. PubMed ID: 28512308 [TBL] [Abstract][Full Text] [Related]
13. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
14. Security evaluation of quantum key distribution with weak basis-choice flaws. Sun SH; Tian ZY; Zhao MS; Ma Y Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761 [TBL] [Abstract][Full Text] [Related]
15. Provably secure and high-rate quantum key distribution with time-bin qudits. Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028 [TBL] [Abstract][Full Text] [Related]
17. Quantum communication with coherent states of light. Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491 [TBL] [Abstract][Full Text] [Related]
18. Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. Koashi M Phys Rev Lett; 2004 Sep; 93(12):120501. PubMed ID: 15447243 [TBL] [Abstract][Full Text] [Related]
19. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685 [TBL] [Abstract][Full Text] [Related]
20. Security analysis of quantum key distribution on passive optical networks. Lim K; Ko H; Suh C; Rhee JK Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]