These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

138 related articles for article (PubMed ID: 25378231)

  • 1. Quantum discord as a resource for quantum cryptography.
    Pirandola S
    Sci Rep; 2014 Nov; 4():6956. PubMed ID: 25378231
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quantum cryptographic resource distillation and entanglement.
    Choi M; Lee S
    Sci Rep; 2021 Oct; 11(1):21095. PubMed ID: 34702893
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
    Bruss D; Christandl M; Ekert A; Englert BG; Kaszlikowski D; Macchiavello C
    Phys Rev Lett; 2003 Aug; 91(9):097901. PubMed ID: 14525209
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Randomness Certification from Multipartite Quantum Steering for Arbitrary Dimensional Systems.
    Li Y; Xiang Y; Yu XD; Nguyen HC; Gühne O; He Q
    Phys Rev Lett; 2024 Feb; 132(8):080201. PubMed ID: 38457732
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Experimental quantum key distribution certified by Bell's theorem.
    Nadlinger DP; Drmota P; Nichol BC; Araneda G; Main D; Srinivas R; Lucas DM; Ballance CJ; Ivanov K; Tan EY; Sekatski P; Urbanke RL; Renner R; Sangouard N; Bancal JD
    Nature; 2022 Jul; 607(7920):682-686. PubMed ID: 35896644
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Fundamental Limits on the Capacities of Bipartite Quantum Interactions.
    Bäuml S; Das S; Wilde MM
    Phys Rev Lett; 2018 Dec; 121(25):250504. PubMed ID: 30608775
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Device-independent security of quantum cryptography against collective attacks.
    Acín A; Brunner N; Gisin N; Massar S; Pironio S; Scarani V
    Phys Rev Lett; 2007 Jun; 98(23):230501. PubMed ID: 17677888
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Extremal quantum correlations and cryptographic security.
    Franz T; Furrer F; Werner RF
    Phys Rev Lett; 2011 Jun; 106(25):250502. PubMed ID: 21770618
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
    Kon WY; Lim CCW
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.
    V AD; V K
    Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Measurement-Device-Independent Two-Party Cryptography with Error Estimation.
    Zhou Z; Guang Q; Gao C; Jiang D; Chen L
    Sensors (Basel); 2020 Nov; 20(21):. PubMed ID: 33171748
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Post-quantum cryptography.
    Bernstein DJ; Lange T
    Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Fully device-independent quantum key distribution.
    Vazirani U; Vidick T
    Phys Rev Lett; 2014 Oct; 113(14):140501. PubMed ID: 25325625
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
    Grosshans F; Cerf NJ
    Phys Rev Lett; 2004 Jan; 92(4):047905. PubMed ID: 14995411
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
    Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V
    Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy.
    Shamshad S; Riaz F; Riaz R; Rizvi SS; Abdulla S
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365848
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Necessary and sufficient condition for nonzero quantum discord.
    Dakić B; Vedral V; Brukner C
    Phys Rev Lett; 2010 Nov; 105(19):190502. PubMed ID: 21231155
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Private entanglement over arbitrary distances, even using noisy apparatus.
    Aschauer H; Briegel HJ
    Phys Rev Lett; 2002 Jan; 88(4):047902. PubMed ID: 11801170
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quantum discord bounds the amount of distributed entanglement.
    Chuan TK; Maillard J; Modi K; Paterek T; Paternostro M; Piani M
    Phys Rev Lett; 2012 Aug; 109(7):070501. PubMed ID: 23006347
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.