These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
9. Measurement-device-independent quantum key distribution with leaky sources. Wang W; Tamaki K; Curty M Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254 [TBL] [Abstract][Full Text] [Related]
10. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition. Wang RQ; Yin ZQ; Lu FY; Wang R; Wang S; Chen W; Huang W; Xu BJ; Guo GC; Han ZF Opt Express; 2020 Jul; 28(15):22594-22605. PubMed ID: 32752517 [TBL] [Abstract][Full Text] [Related]
11. Secure BB84-type quantum key distribution with a simple phase error formula. Yin HL; Chen ZB Opt Lett; 2020 Apr; 45(7):1627-1630. PubMed ID: 32235959 [TBL] [Abstract][Full Text] [Related]
12. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
13. Plug-and-play round-robin differential phase-shift quantum key distribution. Mao QP; Wang L; Zhao SM Sci Rep; 2017 Nov; 7(1):15435. PubMed ID: 29133835 [TBL] [Abstract][Full Text] [Related]
14. Experimental quantum key distribution with decoy states. Zhao Y; Qi B; Ma X; Lo HK; Qian L Phys Rev Lett; 2006 Feb; 96(7):070502. PubMed ID: 16606067 [TBL] [Abstract][Full Text] [Related]
15. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
16. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction. Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123 [TBL] [Abstract][Full Text] [Related]
17. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources. Chen R; Bao W; Zhou C; Li H; Wang Y; Bao H Opt Express; 2016 Mar; 24(6):6594-605. PubMed ID: 27136849 [TBL] [Abstract][Full Text] [Related]
18. Security of quantum key distribution with multiphoton components. Yin HL; Fu Y; Mao Y; Chen ZB Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014 [TBL] [Abstract][Full Text] [Related]
19. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method. Liu L; Guo FZ; Qin SJ; Wen QY Sci Rep; 2017 Feb; 7():42261. PubMed ID: 28198808 [TBL] [Abstract][Full Text] [Related]
20. Decoy-state quantum key distribution with polarized photons over 200 km. Liu Y; Chen TY; Wang J; Cai WQ; Wan X; Chen LK; Wang JH; Liu SB; Liang H; Yang L; Peng CZ; Chen K; Chen ZB; Pan JW Opt Express; 2010 Apr; 18(8):8587-94. PubMed ID: 20588703 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]