These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
158 related articles for article (PubMed ID: 33673729)
1. Unidimensional Two-Way Continuous-Variable Quantum Key Distribution Using Coherent States. Bian Y; Huang L; Zhang Y Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33673729 [TBL] [Abstract][Full Text] [Related]
2. Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations. Wang P; Wang X; Li Y Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265248 [TBL] [Abstract][Full Text] [Related]
3. Practical limitation for continuous-variable quantum cryptography using coherent States. Namiki R; Hirano T Phys Rev Lett; 2004 Mar; 92(11):117901. PubMed ID: 15089171 [TBL] [Abstract][Full Text] [Related]
4. Practical semi-quantum key distribution with one-way key and one basis. Wang K; Yang XQ; Li TY; Lin YQ; Hai N; Yin ZQ Opt Express; 2023 Nov; 31(24):40730-40740. PubMed ID: 38041365 [TBL] [Abstract][Full Text] [Related]
5. Quantum digital signature with unidimensional continuous-variable against the measurement angular error. Zhao W; Shi R; Wu X; Wang F; Ruan X Opt Express; 2023 May; 31(10):17003-17016. PubMed ID: 37157766 [TBL] [Abstract][Full Text] [Related]
6. General immunity and superadditivity of two-way Gaussian quantum cryptography. Ottaviani C; Pirandola S Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053 [TBL] [Abstract][Full Text] [Related]
7. Monitoring of continuous-variable quantum key distribution system in real environment. Liu W; Peng J; Huang P; Huang D; Zeng G Opt Express; 2017 Aug; 25(16):19429-19443. PubMed ID: 29041137 [TBL] [Abstract][Full Text] [Related]
8. Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. Pirandola S; Braunstein SL; Lloyd S Phys Rev Lett; 2008 Nov; 101(20):200504. PubMed ID: 19113324 [TBL] [Abstract][Full Text] [Related]
10. Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution. Zhao W; Shi R; Huang D Sci Rep; 2019 Dec; 9(1):18155. PubMed ID: 31796759 [TBL] [Abstract][Full Text] [Related]
11. Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution. Feng K; Wang Y; Li Y; Wang Y; Zuo Z; Guo Y Entropy (Basel); 2024 Jun; 26(6):. PubMed ID: 38920524 [TBL] [Abstract][Full Text] [Related]
12. Performance Improvement of Discretely Modulated Continuous-Variable Quantum Key Distribution with Untrusted Source via Heralded Hybrid Linear Amplifier. Zhou K; Wu X; Mao Y; Chen Z; Liao Q; Guo Y Entropy (Basel); 2020 Aug; 22(8):. PubMed ID: 33286652 [TBL] [Abstract][Full Text] [Related]
13. Security analysis of continuous variable quantum key distribution based on entangled states with biased correlations. Zhang W; Li R; Wang Y; Wang X; Tian L; Zheng Y Opt Express; 2021 Jul; 29(14):22623-22635. PubMed ID: 34266021 [TBL] [Abstract][Full Text] [Related]
14. Continuous-variable source-device-independent quantum key distribution against general attacks. Zhang Y; Chen Z; Weedbrook C; Yu S; Guo H Sci Rep; 2020 Apr; 10(1):6673. PubMed ID: 32317691 [TBL] [Abstract][Full Text] [Related]
15. Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis. Zheng Y; Shi H; Pan W; Wang Q; Mao J Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573307 [TBL] [Abstract][Full Text] [Related]
16. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Pavičić M Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044 [TBL] [Abstract][Full Text] [Related]
17. Feasibility of quantum key distribution with macroscopically bright coherent light. Kovalenko O; Spasibko KY; Chekhova MV; Usenko VC; Filip R Opt Express; 2019 Dec; 27(25):36154-36163. PubMed ID: 31873400 [TBL] [Abstract][Full Text] [Related]
18. Continuous variable quantum key distribution with modulated entangled states. Madsen LS; Usenko VC; Lassen M; Filip R; Andersen UL Nat Commun; 2012; 3():1083. PubMed ID: 23011137 [TBL] [Abstract][Full Text] [Related]
19. Beating the photon-number-splitting attack in practical quantum cryptography. Wang XB Phys Rev Lett; 2005 Jun; 94(23):230503. PubMed ID: 16090451 [TBL] [Abstract][Full Text] [Related]
20. Experimental implementation of non-Gaussian attacks on a continuous-variable quantum-key-distribution system. Lodewyck J; Debuisschert T; García-Patrón R; Tualle-Brouri R; Cerf NJ; Grangier P Phys Rev Lett; 2007 Jan; 98(3):030503. PubMed ID: 17358671 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]