These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

315 related articles for article (PubMed ID: 26514280)

  • 1. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.
    Gehring T; Händchen V; Duhme J; Furrer F; Franz T; Pacher C; Werner RF; Schnabel R
    Nat Commun; 2015 Oct; 6():8795. PubMed ID: 26514280
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Practical continuous-variable quantum key distribution with composable security.
    Jain N; Chin HM; Mani H; Lupo C; Nikolic DS; Kordts A; Pirandola S; Pedersen TB; Kolb M; Ömer B; Pacher C; Gehring T; Andersen UL
    Nat Commun; 2022 Aug; 13(1):4740. PubMed ID: 35961965
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.
    Furrer F; Franz T; Berta M; Leverrier A; Scholz VB; Tomamichel M; Werner RF
    Phys Rev Lett; 2012 Sep; 109(10):100502. PubMed ID: 23005270
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Finite-key analysis for twin-field quantum key distribution with composable security.
    Yin HL; Chen ZB
    Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security analysis of continuous variable quantum key distribution based on entangled states with biased correlations.
    Zhang W; Li R; Wang Y; Wang X; Tian L; Zheng Y
    Opt Express; 2021 Jul; 29(14):22623-22635. PubMed ID: 34266021
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quantum communication with coherent states of light.
    Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G
    Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Continuous-variable source-device-independent quantum key distribution against general attacks.
    Zhang Y; Chen Z; Weedbrook C; Yu S; Guo H
    Sci Rep; 2020 Apr; 10(1):6673. PubMed ID: 32317691
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Composable security for inter-satellite continuous-variable quantum key distribution in the terahertz band.
    Liu C; Zhu C; Nie M; Yang H; Pei C
    Opt Express; 2022 Apr; 30(9):14798-14816. PubMed ID: 35473216
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Demonstration of Einstein-Podolsky-Rosen Steering Using Hybrid Continuous- and Discrete-Variable Entanglement of Light.
    Cavaillès A; Le Jeannic H; Raskop J; Guccione G; Markham D; Diamanti E; Shaw MD; Verma VB; Nam SW; Laurat J
    Phys Rev Lett; 2018 Oct; 121(17):170403. PubMed ID: 30411932
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution.
    Liao Q; Wang Y; Huang D; Guo Y
    Opt Express; 2018 Aug; 26(16):19907-19920. PubMed ID: 30119310
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis.
    Samsonov E; Goncharov R; Gaidash A; Kozubov A; Egorov V; Gleim A
    Sci Rep; 2020 Jun; 10(1):10034. PubMed ID: 32572271
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quantification of Gaussian quantum steering.
    Kogias I; Lee AR; Ragy S; Adesso G
    Phys Rev Lett; 2015 Feb; 114(6):060403. PubMed ID: 25723193
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Memory attacks on device-independent quantum cryptography.
    Barrett J; Colbeck R; Kent A
    Phys Rev Lett; 2013 Jan; 110(1):010503. PubMed ID: 23383767
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Deterministic quantum teleportation through fiber channels.
    Huo M; Qin J; Cheng J; Yan Z; Qin Z; Su X; Jia X; Xie C; Peng K
    Sci Adv; 2018 Oct; 4(10):eaas9401. PubMed ID: 30345350
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Finite-key analysis for measurement-device-independent quantum key distribution.
    Curty M; Xu F; Cui W; Lim CC; Tamaki K; Lo HK
    Nat Commun; 2014 Apr; 5():3732. PubMed ID: 24776959
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
    Scarani V; Renner R
    Phys Rev Lett; 2008 May; 100(20):200501. PubMed ID: 18518517
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution.
    Chen Z; Zhang Y; Wang X; Yu S; Guo H
    Entropy (Basel); 2019 Jul; 21(7):. PubMed ID: 33267366
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.