These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
162 related articles for article (PubMed ID: 27661950)
1. Detector-decoy high-dimensional quantum key distribution. Bao H; Bao W; Wang Y; Chen R; Zhou C; Jiang M; Li H Opt Express; 2016 Sep; 24(19):22159-68. PubMed ID: 27661950 [TBL] [Abstract][Full Text] [Related]
2. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources. Liu L; Guo FZ; Wen QY Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106 [TBL] [Abstract][Full Text] [Related]
3. Security analysis of quantum key distribution on passive optical networks. Lim K; Ko H; Suh C; Rhee JK Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747 [TBL] [Abstract][Full Text] [Related]
4. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685 [TBL] [Abstract][Full Text] [Related]
5. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. Zhang Z; Mower J; Englund D; Wong FN; Shapiro JH Phys Rev Lett; 2014 Mar; 112(12):120506. PubMed ID: 24724641 [TBL] [Abstract][Full Text] [Related]
6. Practical round-robin differential phase-shift quantum key distribution. Zhang YY; Bao WS; Zhou C; Li HW; Wang Y; Jiang MS Opt Express; 2016 Sep; 24(18):20763-73. PubMed ID: 27607679 [TBL] [Abstract][Full Text] [Related]
7. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Peng CZ; Zhang J; Yang D; Gao WB; Ma HX; Yin H; Zeng HP; Yang T; Wang XB; Pan JW Phys Rev Lett; 2007 Jan; 98(1):010505. PubMed ID: 17358464 [TBL] [Abstract][Full Text] [Related]
8. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution. Wang D; Li M; Guo GC; Wang Q Sci Rep; 2015 Oct; 5():15130. PubMed ID: 26463580 [TBL] [Abstract][Full Text] [Related]
9. Experimental composable security decoy-state quantum key distribution using time-phase encoding. Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847 [TBL] [Abstract][Full Text] [Related]
10. Long-distance decoy-state quantum key distribution in optical fiber. Rosenberg D; Harrington JW; Rice PR; Hiskett PA; Peterson CG; Hughes RJ; Lita AE; Nam SW; Nordholt JE Phys Rev Lett; 2007 Jan; 98(1):010503. PubMed ID: 17358462 [TBL] [Abstract][Full Text] [Related]
11. Simple and efficient quantum key distribution with parametric down-conversion. Adachi Y; Yamamoto T; Koashi M; Imoto N Phys Rev Lett; 2007 Nov; 99(18):180503. PubMed ID: 17995389 [TBL] [Abstract][Full Text] [Related]
12. Decoy-state phase-matching quantum key distribution with source errors. Yu Y; Wang L; Zhao S; Mao Q Opt Express; 2021 Jan; 29(2):2227-2243. PubMed ID: 33726422 [TBL] [Abstract][Full Text] [Related]
13. Experimental quantum key distribution with decoy states. Zhao Y; Qi B; Ma X; Lo HK; Qian L Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067 [TBL] [Abstract][Full Text] [Related]
14. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources. Chen R; Bao W; Zhou C; Li H; Wang Y; Bao H Opt Express; 2016 Mar; 24(6):6594-605. PubMed ID: 27136849 [TBL] [Abstract][Full Text] [Related]
15. Experimental measurement-device-independent quantum key distribution. Liu Y; Chen TY; Wang LJ; Liang H; Shentu GL; Wang J; Cui K; Yin HL; Liu NL; Li L; Ma X; Pelc JS; Fejer MM; Peng CZ; Zhang Q; Pan JW Phys Rev Lett; 2013 Sep; 111(13):130502. PubMed ID: 24116758 [TBL] [Abstract][Full Text] [Related]
16. Security of six-state quantum key distribution protocol with threshold detectors. Kato G; Tamaki K Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610 [TBL] [Abstract][Full Text] [Related]