These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
4. Practical round-robin differential phase-shift quantum key distribution. Zhang YY; Bao WS; Zhou C; Li HW; Wang Y; Jiang MS Opt Express; 2016 Sep; 24(18):20763-73. PubMed ID: 27607679 [TBL] [Abstract][Full Text] [Related]
5. Flexible quantum private queries based on quantum key distribution. Gao F; Liu B; Wen QY; Chen H Opt Express; 2012 Jul; 20(16):17411-20. PubMed ID: 23038294 [TBL] [Abstract][Full Text] [Related]
6. Round-robin-differential-phase-shift quantum key distribution with monitoring signal disturbance. Wang R; Yin ZQ; Wang S; Chen W; Guo GC; Han ZF Opt Lett; 2018 Sep; 43(17):4228-4231. PubMed ID: 30160758 [TBL] [Abstract][Full Text] [Related]
7. Plug-and-play round-robin differential phase-shift quantum key distribution. Mao QP; Wang L; Zhao SM Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835 [TBL] [Abstract][Full Text] [Related]
8. Performing private database queries in a real-world environment using a quantum protocol. Chan P; Lucio-Martinez I; Mo X; Simon C; Tittel W Sci Rep; 2014 Jun; 4():5233. PubMed ID: 24913129 [TBL] [Abstract][Full Text] [Related]
9. Finite-key analysis for round-robin-differential-phase-shift quantum key distribution. Liu H; Yin ZQ; Wang R; Lu FY; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF Opt Express; 2020 May; 28(10):15416-15423. PubMed ID: 32403569 [TBL] [Abstract][Full Text] [Related]
10. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. Kon WY; Lim CCW Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236 [TBL] [Abstract][Full Text] [Related]
11. Differential-phase-shift quantum key distribution experiment with a planar light-wave circuit Mach-Zehnder interferometer. Honjo T; Inoue K; Takahashi H Opt Lett; 2004 Dec; 29(23):2797-9. PubMed ID: 15605509 [TBL] [Abstract][Full Text] [Related]
12. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method. Liu L; Guo FZ; Qin SJ; Wen QY Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808 [TBL] [Abstract][Full Text] [Related]