These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

235 related articles for article (PubMed ID: 31745131)

  • 1. Finite-key analysis for twin-field quantum key distribution with composable security.
    Yin HL; Chen ZB
    Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Coherent-State-Based Twin-Field Quantum Key Distribution.
    Yin HL; Chen ZB
    Sci Rep; 2019 Oct; 9(1):14918. PubMed ID: 31624279
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Practical continuous-variable quantum key distribution with composable security.
    Jain N; Chin HM; Mani H; Lupo C; Nikolic DS; Kordts A; Pirandola S; Pedersen TB; Kolb M; Ömer B; Pacher C; Gehring T; Andersen UL
    Nat Commun; 2022 Aug; 13(1):4740. PubMed ID: 35961965
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition.
    Wang RQ; Yin ZQ; Lu FY; Wang R; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF
    Opt Express; 2020 Jul; 28(15):22594-22605. PubMed ID: 32752517
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Measurement-Device-Independent Twin-Field Quantum Key Distribution.
    Yin HL; Fu Y
    Sci Rep; 2019 Feb; 9(1):3045. PubMed ID: 30816262
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness.
    Jiang XL; Wang Y; Lu YF; Li JJ; Zhou C; Bao WS
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420359
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Composable security proof for continuous-variable quantum key distribution with coherent States.
    Leverrier A
    Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Finite-size security of continuous-variable quantum key distribution with digital signal processing.
    Matsuura T; Maeda K; Sasaki T; Koashi M
    Nat Commun; 2021 Jan; 12(1):252. PubMed ID: 33441559
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization.
    Wang RQ; Yin ZQ; Jin XH; Wang R; Wang S; Chen W; Guo GC; Han ZF
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832625
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement.
    Li W; Wang L; Zhao S
    Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Field Test of Twin-Field Quantum Key Distribution through Sending-or-Not-Sending over 428 km.
    Liu H; Jiang C; Zhu HT; Zou M; Yu ZW; Hu XL; Xu H; Ma S; Han Z; Chen JP; Dai Y; Tang SB; Zhang W; Li H; You L; Wang Z; Hua Y; Hu H; Zhang H; Zhou F; Zhang Q; Wang XB; Chen TY; Pan JW
    Phys Rev Lett; 2021 Jun; 126(25):250502. PubMed ID: 34241519
    [TBL] [Abstract][Full Text] [Related]  

  • 13. More optimal relativistic quantum key distribution.
    Bebrov G
    Sci Rep; 2022 Sep; 12(1):15377. PubMed ID: 36100618
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution.
    Zhong X; Hu J; Curty M; Qian L; Lo HK
    Phys Rev Lett; 2019 Sep; 123(10):100506. PubMed ID: 31573297
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.
    Gehring T; Händchen V; Duhme J; Furrer F; Franz T; Pacher C; Werner RF; Schnabel R
    Nat Commun; 2015 Oct; 6():8795. PubMed ID: 26514280
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction.
    Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS
    Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.
    Liu L; Guo FZ; Wen QY
    Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Prefixed-Threshold Real-Time Selection for Free-Space Sending-or-Not Twin-Field Quantum Key Distribution.
    Yu Y; Xu R; Wang L; Mao Q; Zhao S
    Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327855
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Sending-or-Not-Sending Twin-Field Quantum Key Distribution with a Passive Decoy-State Method.
    Xue K; Shen Z; Zhao S; Mao Q
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626547
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.