These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
7. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states. Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832 [TBL] [Abstract][Full Text] [Related]
8. Quantum key distribution with hacking countermeasures and long term field trial. Dixon AR; Dynes JF; Lucamarini M; Fröhlich B; Sharpe AW; Plews A; Tam W; Yuan ZL; Tanizawa Y; Sato H; Kawamura S; Fujiwara M; Sasaki M; Shields AJ Sci Rep; 2017 May; 7(1):1978. PubMed ID: 28512308 [TBL] [Abstract][Full Text] [Related]
9. Countermeasure for security loophole caused by asymmetric correlations of reference frame independent quantum key distribution with fewer quantum states. Lim K; Choi BS; Baek JH; Kim M; Choe JS; Kim KJ; Ko YH; Youn CJ Opt Express; 2021 Jun; 29(12):18966-18975. PubMed ID: 34154140 [TBL] [Abstract][Full Text] [Related]
10. Parallel Device-Independent Quantum Key Distribution. Jain R; Miller CA; Shi Y IEEE Trans Inf Theory; 2020; 66(9):. PubMed ID: 33654327 [TBL] [Abstract][Full Text] [Related]
11. Counterfactual quantum key distribution with untrusted detectors. Lin YQ; Wang M; Yang XQ; Liu HW Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753 [TBL] [Abstract][Full Text] [Related]
12. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
13. BB84 quantum key distribution transmitter utilising broadband sources and a narrow spectral filter. Noblet Y; Donaldson R Opt Express; 2023 Apr; 31(9):15145-15155. PubMed ID: 37157362 [TBL] [Abstract][Full Text] [Related]
14. Finite-key analysis for twin-field quantum key distribution with composable security. Yin HL; Chen ZB Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131 [TBL] [Abstract][Full Text] [Related]
15. Security of six-state quantum key distribution protocol with threshold detectors. Kato G; Tamaki K Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610 [TBL] [Abstract][Full Text] [Related]
16. Device-Independent Quantum Key Distribution with Random Postselection. Xu F; Zhang YZ; Zhang Q; Pan JW Phys Rev Lett; 2022 Mar; 128(11):110506. PubMed ID: 35363036 [TBL] [Abstract][Full Text] [Related]
17. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction. Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123 [TBL] [Abstract][Full Text] [Related]
18. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization. Wang RQ; Yin ZQ; Jin XH; Wang R; Wang S; Chen W; Guo GC; Han ZF Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832625 [TBL] [Abstract][Full Text] [Related]
19. Measurement-device-independent quantum key distribution with insecure sources. Ding HJ; Zhou XY; Zhang CH; Li J; Wang Q Opt Lett; 2022 Feb; 47(3):665-668. PubMed ID: 35103698 [TBL] [Abstract][Full Text] [Related]
20. A Review of Security Evaluation of Practical Quantum Key Distribution System. Sun S; Huang A Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]