These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

225 related articles for article (PubMed ID: 23679725)

  • 1. Experimental eavesdropping based on optimal quantum cloning.
    Bartkiewicz K; Lemr K; Cernoch A; Soubusta J; Miranowicz A
    Phys Rev Lett; 2013 Apr; 110(17):173601. PubMed ID: 23679725
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

  • 3. High-dimensional quantum cloning and applications to quantum hacking.
    Bouchard F; Fickler R; Boyd RW; Karimi E
    Sci Adv; 2017 Feb; 3(2):e1601915. PubMed ID: 28168219
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Room-temperature quantum cloning machine with full coherent phase control in nanodiamond.
    Chang YC; Liu GQ; Liu DQ; Fan H; Pan XY
    Sci Rep; 2013; 3():1498. PubMed ID: 23511233
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Experimental quantum key distribution certified by Bell's theorem.
    Nadlinger DP; Drmota P; Nichol BC; Araneda G; Main D; Srinivas R; Lucas DM; Ballance CJ; Ivanov K; Tan EY; Sekatski P; Urbanke RL; Renner R; Sangouard N; Bancal JD
    Nature; 2022 Jul; 607(7920):682-686. PubMed ID: 35896644
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security of quantum key distribution using d-level systems.
    Cerf NJ; Bourennane M; Karlsson A; Gisin N
    Phys Rev Lett; 2002 Mar; 88(12):127902. PubMed ID: 11909502
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Memory-built-in quantum cloning in a hybrid solid-state spin register.
    Wang WB; Zu C; He L; Zhang WG; Duan LM
    Sci Rep; 2015 Jul; 5():12203. PubMed ID: 26178617
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Continuous variable quantum cryptography using coherent states.
    Grosshans F; Grangier P
    Phys Rev Lett; 2002 Feb; 88(5):057902. PubMed ID: 11863782
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum photonic network and physical layer security.
    Sasaki M; Endo H; Fujiwara M; Kitamura M; Ito T; Shimizu R; Toyoshima M
    Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652495
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimal eavesdropping in cryptography with three-dimensional quantum states.
    Bruss D; Macchiavello C
    Phys Rev Lett; 2002 Mar; 88(12):127901. PubMed ID: 11909501
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Experimental quantum key distribution with finite-key security analysis for noisy channels.
    Bacco D; Canale M; Laurenti N; Vallone G; Villoresi P
    Nat Commun; 2013; 4():2363. PubMed ID: 24008848
    [TBL] [Abstract][Full Text] [Related]  

  • 12. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 14. All-Optical Optimal N-to-M Quantum Cloning of Coherent States.
    Liu S; Lou Y; Chen Y; Jing J
    Phys Rev Lett; 2021 Feb; 126(6):060503. PubMed ID: 33635702
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Experimental demonstration of probabilistic quantum cloning.
    Chen H; Lu D; Chong B; Qin G; Zhou X; Peng X; Du J
    Phys Rev Lett; 2011 May; 106(18):180404. PubMed ID: 21635072
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Monitoring of continuous-variable quantum key distribution system in real environment.
    Liu W; Peng J; Huang P; Huang D; Zeng G
    Opt Express; 2017 Aug; 25(16):19429-19443. PubMed ID: 29041137
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
    Scarani V; Renner R
    Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Eavesdropping on the "ping-pong" quantum communication protocol.
    Wójcik A
    Phys Rev Lett; 2003 Apr; 90(15):157901. PubMed ID: 12732070
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.