These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
222 related articles for article (PubMed ID: 24755767)
1. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sun SH; Jiang MS; Ma XC; Li CY; Liang LM Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767 [TBL] [Abstract][Full Text] [Related]
2. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing. Chen X; Chen L; Yan Y Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118 [TBL] [Abstract][Full Text] [Related]
3. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
4. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions. Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295 [TBL] [Abstract][Full Text] [Related]
5. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
6. Measurement-device-independent quantum key distribution with modified coherent state. Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231 [TBL] [Abstract][Full Text] [Related]
7. A Review of Security Evaluation of Practical Quantum Key Distribution System. Sun S; Huang A Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554 [TBL] [Abstract][Full Text] [Related]
8. Phase-Matching Quantum Key Distribution with Discrete Phase Randomization. Zhang X; Wang Y; Jiang M; Lu Y; Li H; Zhou C; Bao W Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922572 [TBL] [Abstract][Full Text] [Related]
9. Satellite-to-ground quantum key distribution. Liao SK; Cai WQ; Liu WY; Zhang L; Li Y; Ren JG; Yin J; Shen Q; Cao Y; Li ZP; Li FZ; Chen XW; Sun LH; Jia JJ; Wu JC; Jiang XJ; Wang JF; Huang YM; Wang Q; Zhou YL; Deng L; Xi T; Ma L; Hu T; Zhang Q; Chen YA; Liu NL; Wang XB; Zhu ZC; Lu CY; Shu R; Peng CZ; Wang JY; Pan JW Nature; 2017 Sep; 549(7670):43-47. PubMed ID: 28825707 [TBL] [Abstract][Full Text] [Related]
10. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement. Li W; Wang L; Zhao S Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069 [TBL] [Abstract][Full Text] [Related]
11. Entanglement-based secure quantum cryptography over 1,120 kilometres. Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968 [TBL] [Abstract][Full Text] [Related]
12. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670 [TBL] [Abstract][Full Text] [Related]
13. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states. Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832 [TBL] [Abstract][Full Text] [Related]
14. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248 [TBL] [Abstract][Full Text] [Related]
15. Measurement-Device-Independent Quantum Key Distribution Based on Decoherence-Free Subspaces with Logical Bell State Analyzer. Wei JH; Xu XY; Hu SM; Zhou Q; Li L; Liu NL; Chen K Entropy (Basel); 2023 May; 25(6):. PubMed ID: 37372213 [TBL] [Abstract][Full Text] [Related]
16. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution. Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832 [TBL] [Abstract][Full Text] [Related]
18. Experimental measurement-device-independent quantum key distribution. Liu Y; Chen TY; Wang LJ; Liang H; Shentu GL; Wang J; Cui K; Yin HL; Liu NL; Li L; Ma X; Pelc JS; Fejer MM; Peng CZ; Zhang Q; Pan JW Phys Rev Lett; 2013 Sep; 111(13):130502. PubMed ID: 24116758 [TBL] [Abstract][Full Text] [Related]
19. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization. Wang RQ; Yin ZQ; Jin XH; Wang R; Wang S; Chen W; Guo GC; Han ZF Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832625 [TBL] [Abstract][Full Text] [Related]
20. Measurement-device-independent quantum key distribution with leaky sources. Wang W; Tamaki K; Curty M Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]