These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
7. Simple proof of security of the BB84 quantum key distribution protocol. Shor PW; Preskill J Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303 [TBL] [Abstract][Full Text] [Related]
8. A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator. Korzh B; Walenta N; Houlmann R; Zbinden H Opt Express; 2013 Aug; 21(17):19579-92. PubMed ID: 24105505 [TBL] [Abstract][Full Text] [Related]
9. Practical quantum key distribution protocol without monitoring signal disturbance. Sasaki T; Yamamoto Y; Koashi M Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060 [TBL] [Abstract][Full Text] [Related]
10. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685 [TBL] [Abstract][Full Text] [Related]
11. Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol. Wei CY; Gao F; Wen QY; Wang TY Sci Rep; 2014 Dec; 4():7537. PubMed ID: 25518810 [TBL] [Abstract][Full Text] [Related]
12. Experimental quantum key distribution with decoy states. Zhao Y; Qi B; Ma X; Lo HK; Qian L Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067 [TBL] [Abstract][Full Text] [Related]
13. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Kon WY; Lim CCW Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236 [TBL] [Abstract][Full Text] [Related]
14. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
15. An Efficient Routing Protocol for Quantum Key Distribution Networks. Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133 [TBL] [Abstract][Full Text] [Related]
16. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Schmitt-Manderbach T; Weier H; Fürst M; Ursin R; Tiefenbacher F; Scheidl T; Perdigues J; Sodnik Z; Kurtsiefer C; Rarity JG; Zeilinger A; Weinfurter H Phys Rev Lett; 2007 Jan; 98(1):010504. PubMed ID: 17358463 [TBL] [Abstract][Full Text] [Related]
17. Employing covert communications-based information reconciliation and multiple spatial modes to polarization entanglement QKD. Gariano J; Djordjevic IB Opt Lett; 2019 Feb; 44(3):687-690. PubMed ID: 30702711 [TBL] [Abstract][Full Text] [Related]
18. Experimental realization of equiangular three-state quantum key distribution. Schiavon M; Vallone G; Villoresi P Sci Rep; 2016 Jul; 6():30089. PubMed ID: 27465643 [TBL] [Abstract][Full Text] [Related]
19. Secure quantum key distribution with an uncharacterized source. Koashi M; Preskill J Phys Rev Lett; 2003 Feb; 90(5):057902. PubMed ID: 12633399 [TBL] [Abstract][Full Text] [Related]
20. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. Yin HL; Chen TY; Yu ZW; Liu H; You LX; Zhou YH; Chen SJ; Mao Y; Huang MQ; Zhang WJ; Chen H; Li MJ; Nolan D; Zhou F; Jiang X; Wang Z; Zhang Q; Wang XB; Pan JW Phys Rev Lett; 2016 Nov; 117(19):190501. PubMed ID: 27858431 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]