These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
138 related articles for article (PubMed ID: 25378231)
1. Quantum discord as a resource for quantum cryptography. Pirandola S Sci Rep; 2014 Nov; 4():6956. PubMed ID: 25378231 [TBL] [Abstract][Full Text] [Related]
2. Quantum cryptographic resource distillation and entanglement. Choi M; Lee S Sci Rep; 2021 Oct; 11(1):21095. PubMed ID: 34702893 [TBL] [Abstract][Full Text] [Related]
3. Tomographic quantum cryptography: equivalence of quantum and classical key distillation. Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209 [TBL] [Abstract][Full Text] [Related]
4. Randomness Certification from Multipartite Quantum Steering for Arbitrary Dimensional Systems. Li Y; Xiang Y; Yu XD; Nguyen HC; Gühne O; He Q Phys Rev Lett; 2024 Feb; 132(8):080201. PubMed ID: 38457732 [TBL] [Abstract][Full Text] [Related]
5. Experimental quantum key distribution certified by Bell's theorem. Nadlinger DP; Drmota P; Nichol BC; Araneda G; Main D; Srinivas R; Lucas DM; Ballance CJ; Ivanov K; Tan EY; Sekatski P; Urbanke RL; Renner R; Sangouard N; Bancal JD Nature; 2022 Jul; 607(7920):682-686. PubMed ID: 35896644 [TBL] [Abstract][Full Text] [Related]
6. Fundamental Limits on the Capacities of Bipartite Quantum Interactions. Bäuml S; Das S; Wilde MM Phys Rev Lett; 2018 Dec; 121(25):250504. PubMed ID: 30608775 [TBL] [Abstract][Full Text] [Related]
8. Extremal quantum correlations and cryptographic security. Franz T; Furrer F; Werner RF Phys Rev Lett; 2011 Jun; 106(25):250502. PubMed ID: 21770618 [TBL] [Abstract][Full Text] [Related]
9. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Adu-Kyere A; Nigussie E; Isoaho J Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045 [TBL] [Abstract][Full Text] [Related]
10. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Kon WY; Lim CCW Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236 [TBL] [Abstract][Full Text] [Related]
11. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. V AD; V K Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585 [TBL] [Abstract][Full Text] [Related]
16. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670 [TBL] [Abstract][Full Text] [Related]
17. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy. Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848 [TBL] [Abstract][Full Text] [Related]
18. Necessary and sufficient condition for nonzero quantum discord. Dakić B; Vedral V; Brukner C Phys Rev Lett; 2010 Nov; 105(19):190502. PubMed ID: 21231155 [TBL] [Abstract][Full Text] [Related]
19. Private entanglement over arbitrary distances, even using noisy apparatus. Aschauer H; Briegel HJ Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170 [TBL] [Abstract][Full Text] [Related]
20. Quantum discord bounds the amount of distributed entanglement. Chuan TK; Maillard J; Modi K; Paterek T; Paternostro M; Piani M Phys Rev Lett; 2012 Aug; 109(7):070501. PubMed ID: 23006347 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]