These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
8. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. Leverrier A Phys Rev Lett; 2017 May; 118(20):200501. PubMed ID: 28581779 [TBL] [Abstract][Full Text] [Related]
9. Practical limitation for continuous-variable quantum cryptography using coherent States. Namiki R; Hirano T Phys Rev Lett; 2004 Mar; 92(11):117901. PubMed ID: 15089171 [TBL] [Abstract][Full Text] [Related]
10. Monitoring of continuous-variable quantum key distribution system in real environment. Liu W; Peng J; Huang P; Huang D; Zeng G Opt Express; 2017 Aug; 25(16):19429-19443. PubMed ID: 29041137 [TBL] [Abstract][Full Text] [Related]
11. Continuous variable quantum cryptography using coherent states. Grosshans F; Grangier P Phys Rev Lett; 2002 Feb; 88(5):057902. PubMed ID: 11863782 [TBL] [Abstract][Full Text] [Related]
12. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270 [TBL] [Abstract][Full Text] [Related]
14. Experimental quantum key distribution with finite-key security analysis for noisy channels. Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P Nat Commun; 2013; 4():2363. PubMed ID: 24008848 [TBL] [Abstract][Full Text] [Related]
15. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Scarani V; Renner R Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517 [TBL] [Abstract][Full Text] [Related]
16. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Bian Y; Huang L; Zhang Y Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729 [TBL] [Abstract][Full Text] [Related]
17. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks. Gehring T; Händchen V; Duhme J; Furrer F; Franz T; Pacher C; Werner RF; Schnabel R Nat Commun; 2015 Oct; 6():8795. PubMed ID: 26514280 [TBL] [Abstract][Full Text] [Related]
18. Security bounds for continuous variables quantum key distribution. Navascués M; Acín A Phys Rev Lett; 2005 Jan; 94(2):020505. PubMed ID: 15698158 [TBL] [Abstract][Full Text] [Related]
19. Postselection technique for quantum channels with applications to quantum cryptography. Christandl M; König R; Renner R Phys Rev Lett; 2009 Jan; 102(2):020504. PubMed ID: 19257257 [TBL] [Abstract][Full Text] [Related]
20. Quantum cryptography as a retrodiction problem. Werner AH; Franz T; Werner RF Phys Rev Lett; 2009 Nov; 103(22):220504. PubMed ID: 20366080 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]