These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
257 related articles for article (PubMed ID: 30320832)
1. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution. Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832 [TBL] [Abstract][Full Text] [Related]
2. Suppression of patterning effect using IQ modulator for high-speed quantum key distribution systems. Gao Y; Yuan Z Opt Lett; 2023 Feb; 48(4):1068-1071. PubMed ID: 36791012 [TBL] [Abstract][Full Text] [Related]
3. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction. Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123 [TBL] [Abstract][Full Text] [Related]
4. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources. Liu L; Guo FZ; Wen QY Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106 [TBL] [Abstract][Full Text] [Related]
5. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources. Song TT; Qin SJ; Wen QY; Wang YK; Jia HY Sci Rep; 2015 Oct; 5():15276. PubMed ID: 26471947 [TBL] [Abstract][Full Text] [Related]
8. A 5 GHz and 7.5 V multi-amplitude modulator driving circuit for practical high-speed quantum key distribution. Liu X; Huang MQ; Min H; Jin G; Jiang X; Peng CZ Rev Sci Instrum; 2020 Feb; 91(2):024705. PubMed ID: 32113405 [TBL] [Abstract][Full Text] [Related]
9. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248 [TBL] [Abstract][Full Text] [Related]
10. Entanglement-based secure quantum cryptography over 1,120 kilometres. Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968 [TBL] [Abstract][Full Text] [Related]
11. Measurement-device-independent quantum key distribution with leaky sources. Wang W; Tamaki K; Curty M Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254 [TBL] [Abstract][Full Text] [Related]
12. Experimental quantum key distribution with decoy states. Zhao Y; Qi B; Ma X; Lo HK; Qian L Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067 [TBL] [Abstract][Full Text] [Related]
13. Application and Development of QKD-Based Quantum Secure Communication. Lai J; Yao F; Wang J; Zhang M; Li F; Zhao W; Zhang H Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190415 [TBL] [Abstract][Full Text] [Related]
14. Experimental quantum key distribution with uncharacterized sources and projective measurements. Zhu JR; Wu WZ; Ji L; Zhang CM; Wang Q Opt Lett; 2019 Dec; 44(23):5703-5706. PubMed ID: 31774758 [TBL] [Abstract][Full Text] [Related]
15. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sun SH; Jiang MS; Ma XC; Li CY; Liang LM Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767 [TBL] [Abstract][Full Text] [Related]
16. Experimental realization of a reference-frame-independent decoy BB84 quantum key distribution based on Sagnac interferometer. Li YP; Chen W; Wang FX; Yin ZQ; Zhang L; Liu H; Wang S; He DY; Zhou Z; Guo GC; Han ZF Opt Lett; 2019 Sep; 44(18):4523-4526. PubMed ID: 31517921 [TBL] [Abstract][Full Text] [Related]
18. An Efficient Routing Protocol for Quantum Key Distribution Networks. Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133 [TBL] [Abstract][Full Text] [Related]
19. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method. Liu L; Guo FZ; Qin SJ; Wen QY Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808 [TBL] [Abstract][Full Text] [Related]
20. Provably secure and high-rate quantum key distribution with time-bin qudits. Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]