These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

186 related articles for article (PubMed ID: 33097761)

  • 1. Security evaluation of quantum key distribution with weak basis-choice flaws.
    Sun SH; Tian ZY; Zhao MS; Ma Y
    Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation.
    Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution.
    Wang C; Song XT; Yin ZQ; Wang S; Chen W; Zhang CM; Guo GC; Han ZF
    Phys Rev Lett; 2015 Oct; 115(16):160502. PubMed ID: 26550855
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Review of Security Evaluation of Practical Quantum Key Distribution System.
    Sun S; Huang A
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unconditional security of single-photon differential phase shift quantum key distribution.
    Wen K; Tamaki K; Yamamoto Y
    Phys Rev Lett; 2009 Oct; 103(17):170503. PubMed ID: 19905739
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Quantum key distribution with prepare-and-measure Bell test.
    Tan YG
    Sci Rep; 2016 Oct; 6():35032. PubMed ID: 27733771
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
    Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB
    Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295
    [TBL] [Abstract][Full Text] [Related]  

  • 9. One-sided device-independent quantum key distribution for two independent parties.
    Xin J; Lu XM; Li X; Li G
    Opt Express; 2020 Apr; 28(8):11439-11450. PubMed ID: 32403655
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Quantum key distribution session with 16-dimensional photonic states.
    Etcheverry S; Cañas G; Gómez ES; Nogueira WA; Saavedra C; Xavier GB; Lima G
    Sci Rep; 2013; 3():2316. PubMed ID: 23897033
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness.
    Jiang XL; Wang Y; Lu YF; Li JJ; Zhou C; Bao WS
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420359
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Chip-based quantum key distribution.
    Sibson P; Erven C; Godfrey M; Miki S; Yamashita T; Fujiwara M; Sasaki M; Terai H; Tanner MG; Natarajan CM; Hadfield RH; O'Brien JL; Thompson MG
    Nat Commun; 2017 Feb; 8():13984. PubMed ID: 28181489
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hacking on decoy-state quantum key distribution system with partial phase randomization.
    Sun SH; Jiang MS; Ma XC; Li CY; Liang LM
    Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Employing covert communications-based information reconciliation and multiple spatial modes to polarization entanglement QKD.
    Gariano J; Djordjevic IB
    Opt Lett; 2019 Feb; 44(3):687-690. PubMed ID: 30702711
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Entanglement-based secure quantum cryptography over 1,120 kilometres.
    Yin J; Li YH; Liao SK; Yang M; Cao Y; Zhang L; Ren JG; Cai WQ; Liu WY; Li SL; Shu R; Huang YM; Deng L; Li L; Zhang Q; Liu NL; Chen YA; Lu CY; Wang XB; Xu F; Wang JY; Peng CZ; Ekert AK; Pan JW
    Nature; 2020 Jun; 582(7813):501-505. PubMed ID: 32541968
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security of quantum key distribution with multiphoton components.
    Yin HL; Fu Y; Mao Y; Chen ZB
    Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.
    Wu Z; Huang A; Chen H; Sun SH; Ding J; Qiang X; Fu X; Xu P; Wu J
    Opt Express; 2020 Aug; 28(17):25574-25590. PubMed ID: 32907074
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.
    Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB
    Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Tight security bounds for decoy-state quantum key distribution.
    Yin HL; Zhou MG; Gu J; Xie YM; Lu YS; Chen ZB
    Sci Rep; 2020 Aug; 10(1):14312. PubMed ID: 32868774
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.