164 related articles for article (PubMed ID: 27383014)
1. Security of quantum key distribution with multiphoton components.
Yin HL; Fu Y; Mao Y; Chen ZB
Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
[TBL] [Abstract][Full Text] [Related]
2. Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.
Mizutani A; Tamaki K; Ikuta R; Yamamoto T; Imoto N
Sci Rep; 2014 Jun; 4():5236. PubMed ID: 24913431
[TBL] [Abstract][Full Text] [Related]
3. Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution.
Termos H
Entropy (Basel); 2024 May; 26(6):. PubMed ID: 38920455
[TBL] [Abstract][Full Text] [Related]
4. Experimental underwater quantum key distribution.
Feng Z; Li S; Xu Z
Opt Express; 2021 Mar; 29(6):8725-8736. PubMed ID: 33820314
[TBL] [Abstract][Full Text] [Related]
5. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
Fei YY; Meng XD; Gao M; Wang H; Ma Z
Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
[TBL] [Abstract][Full Text] [Related]
6. Experimental quantum key distribution with decoy states.
Zhao Y; Qi B; Ma X; Lo HK; Qian L
Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067
[TBL] [Abstract][Full Text] [Related]
7. High-rate intercity quantum key distribution with a semiconductor single-photon source.
Yang J; Jiang Z; Benthin F; Hanel J; Fandrich T; Joos R; Bauer S; Kolatschek S; Hreibi A; Rugeramigabo EP; Jetter M; Portalupi SL; Zopf M; Michler P; Kück S; Ding F
Light Sci Appl; 2024 Jul; 13(1):150. PubMed ID: 38956020
[TBL] [Abstract][Full Text] [Related]
8. Security of six-state quantum key distribution protocol with threshold detectors.
Kato G; Tamaki K
Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
[TBL] [Abstract][Full Text] [Related]
9. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing.
Chen X; Chen L; Yan Y
Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118
[TBL] [Abstract][Full Text] [Related]
10. Invisible Trojan-horse attack.
Sajeed S; Minshull C; Jain N; Makarov V
Sci Rep; 2017 Aug; 7(1):8403. PubMed ID: 28827553
[TBL] [Abstract][Full Text] [Related]
11. Unconditional security of single-photon differential phase shift quantum key distribution.
Wen K; Tamaki K; Yamamoto Y
Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
[TBL] [Abstract][Full Text] [Related]
12. Security analysis of quantum key distribution on passive optical networks.
Lim K; Ko H; Suh C; Rhee JK
Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
[TBL] [Abstract][Full Text] [Related]
13. Tight security bounds for decoy-state quantum key distribution.
Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
[TBL] [Abstract][Full Text] [Related]
14. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
[TBL] [Abstract][Full Text] [Related]
15. Qubit-Based Clock Synchronization for QKD Systems Using a Bayesian Approach.
Cochran RD; Gauthier DJ
Entropy (Basel); 2021 Jul; 23(8):. PubMed ID: 34441128
[TBL] [Abstract][Full Text] [Related]
16. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
[TBL] [Abstract][Full Text] [Related]
17. Plug-and-play round-robin differential phase-shift quantum key distribution.
Mao QP; Wang L; Zhao SM
Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
[TBL] [Abstract][Full Text] [Related]
18. Measurement-device-independent quantum key distribution with modified coherent state.
Li M; Zhang CM; Yin ZQ; Chen W; Wang S; Guo GC; Han ZF
Opt Lett; 2014 Feb; 39(4):880-3. PubMed ID: 24562231
[TBL] [Abstract][Full Text] [Related]
19. Phase-Matching Quantum Key Distribution with Discrete Phase Randomization.
Zhang X; Wang Y; Jiang M; Lu Y; Li H; Zhou C; Bao W
Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922572
[TBL] [Abstract][Full Text] [Related]
20. Unconditional security of a three state quantum key distribution protocol.
Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]