These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

129 related articles for article (PubMed ID: 32403861)

  • 1. State preparation robust to modulation signal degradation by use of a dual parallel modulator for high-speed BB84 quantum key distribution systems.
    Zhang W; Kadosawa Y; Tomita A; Ogawa K; Okamoto A
    Opt Express; 2020 Apr; 28(9):13965-13977. PubMed ID: 32403861
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Randomness determines practical security of BB84 quantum key distribution.
    Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF
    Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator.
    Korzh B; Walenta N; Houlmann R; Zbinden H
    Opt Express; 2013 Aug; 21(17):19579-92. PubMed ID: 24105505
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure BB84-type quantum key distribution with a simple phase error formula.
    Yin HL; Chen ZB
    Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental composable security decoy-state quantum key distribution using time-phase encoding.
    Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY
    Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Robust polarization state generation for long-range quantum key distribution.
    Stein A; López Grande IH; Castelvero L; Pruneri V
    Opt Express; 2023 Apr; 31(9):13700-13707. PubMed ID: 37157252
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Simple proof of security of the BB84 quantum key distribution protocol.
    Shor PW; Preskill J
    Phys Rev Lett; 2000 Jul; 85(2):441-4. PubMed ID: 10991303
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Intensity fluctuation of a gain-switched semiconductor laser for quantum key distribution systems.
    Nakata K; Tomita A; Fujiwara M; Yoshino KI; Tajima A; Okamoto A; Ogawa K
    Opt Express; 2017 Jan; 25(2):622-634. PubMed ID: 28157952
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security of six-state quantum key distribution protocol with threshold detectors.
    Kato G; Tamaki K
    Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Practical quantum digital signature with a gigahertz BB84 quantum key distribution system.
    An XB; Zhang H; Zhang CM; Chen W; Wang S; Yin ZQ; Wang Q; He DY; Hao PL; Liu SF; Zhou XY; Guo GC; Han ZF
    Opt Lett; 2019 Jan; 44(1):139-142. PubMed ID: 30645569
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.
    Miroshnichenko GP; Kozubov AV; Gaidash AA; Gleim AV; Horoshko DB
    Opt Express; 2018 Apr; 26(9):11292-11308. PubMed ID: 29716053
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Plug-and-play round-robin differential phase-shift quantum key distribution.
    Mao QP; Wang L; Zhao SM
    Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security analysis of quantum key distribution on passive optical networks.
    Lim K; Ko H; Suh C; Rhee JK
    Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747
    [TBL] [Abstract][Full Text] [Related]  

  • 16. High-speed robust polarization modulation for quantum key distribution.
    Li Y; Li YH; Xie HB; Li ZP; Jiang X; Cai WQ; Ren JG; Yin J; Liao SK; Peng CZ
    Opt Lett; 2019 Nov; 44(21):5262-5265. PubMed ID: 31674983
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Finite-key bound for semi-device-independent quantum key distribution.
    Zhou C; Xu P; Bao WS; Wang Y; Zhang Y; Jiang MS; Li HW
    Opt Express; 2017 Jul; 25(15):16971-16980. PubMed ID: 28789196
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Security of quantum key distribution using d-level systems.
    Cerf NJ; Bourennane M; Karlsson A; Gisin N
    Phys Rev Lett; 2002 Mar; 88(12):127902. PubMed ID: 11909502
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Practical underwater quantum key distribution based on decoy-state BB84 protocol.
    Dong S; Yu Y; Zheng S; Zhu Q; Gai L; Li W; Gu Y
    Appl Opt; 2022 May; 61(15):4471-4477. PubMed ID: 36256286
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.