These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
112 related articles for article (PubMed ID: 32235959)
21. Counterfactual quantum key distribution with untrusted detectors. Lin YQ; Wang M; Yang XQ; Liu HW Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753 [TBL] [Abstract][Full Text] [Related]
28. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
29. Deterministic Secure Quantum Communication on the BB84 System. Jeong YC; Ji SW; Hong C; Park HS; Jang J Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287036 [TBL] [Abstract][Full Text] [Related]
30. Bases selection with pseudo-random functions in BB84 scheme. Dervisevic E; Voznak M; Mehic M Heliyon; 2024 Jan; 10(1):e23578. PubMed ID: 38173502 [TBL] [Abstract][Full Text] [Related]
31. Security of quantum key distribution using d-level systems. Cerf NJ; Bourennane M; Karlsson A; Gisin N Phys Rev Lett; 2002 Mar; 88(12):127902. PubMed ID: 11909502 [TBL] [Abstract][Full Text] [Related]
32. Experimental realization of a reference-frame-independent decoy BB84 quantum key distribution based on Sagnac interferometer. Li YP; Chen W; Wang FX; Yin ZQ; Zhang L; Liu H; Wang S; He DY; Zhou Z; Guo GC; Han ZF Opt Lett; 2019 Sep; 44(18):4523-4526. PubMed ID: 31517921 [TBL] [Abstract][Full Text] [Related]
33. Room-temperature quantum cloning machine with full coherent phase control in nanodiamond. Chang YC; Liu GQ; Liu DQ; Fan H; Pan XY Sci Rep; 2013; 3():1498. PubMed ID: 23511233 [TBL] [Abstract][Full Text] [Related]
34. Proof-of-principle demonstration of measurement-device-independent quantum key distribution based on intrinsically stable polarization-modulated units. Yuan YP; Du C; Shen QQ; Wang JD; Yu YF; Wei ZJ; Chen ZX; Zhang ZM Opt Express; 2020 Apr; 28(8):10772-10782. PubMed ID: 32403601 [TBL] [Abstract][Full Text] [Related]
35. Security evaluation of quantum key distribution with weak basis-choice flaws. Sun SH; Tian ZY; Zhao MS; Ma Y Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761 [TBL] [Abstract][Full Text] [Related]
36. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. Wang C; Song XT; Yin ZQ; Wang S; Chen W; Zhang CM; Guo GC; Han ZF Phys Rev Lett; 2015 Oct; 115(16):160502. PubMed ID: 26550855 [TBL] [Abstract][Full Text] [Related]
37. Quantum Secure Group Communication. Li ZH; Zubairy MS; Al-Amri M Sci Rep; 2018 Mar; 8(1):3899. PubMed ID: 29497080 [TBL] [Abstract][Full Text] [Related]
38. Performance of underwater quantum key distribution with polarization encoding. Zhao SC; Han XH; Xiao Y; Shen Y; Gu YJ; Li WD J Opt Soc Am A Opt Image Sci Vis; 2019 May; 36(5):883-892. PubMed ID: 31045017 [TBL] [Abstract][Full Text] [Related]
39. A Review of Security Evaluation of Practical Quantum Key Distribution System. Sun S; Huang A Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554 [TBL] [Abstract][Full Text] [Related]
40. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Pavičić M Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]