These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Upper Security Bounds for Coherent-One-Way Quantum Key Distribution. González-Payo J; Trényi R; Wang W; Curty M Phys Rev Lett; 2020 Dec; 125(26):260510. PubMed ID: 33449754 [TBL] [Abstract][Full Text] [Related]
3. Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing. Chen X; Chen L; Yan Y Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141118 [TBL] [Abstract][Full Text] [Related]
4. Long-distance decoy-state quantum key distribution in optical fiber. Rosenberg D; Harrington JW; Rice PR; Hiskett PA; Peterson CG; Hughes RJ; Lita AE; Nam SW; Nordholt JE Phys Rev Lett; 2007 Jan; 98(1):010503. PubMed ID: 17358462 [TBL] [Abstract][Full Text] [Related]
5. Provably secure and high-rate quantum key distribution with time-bin qudits. Islam NT; Lim CCW; Cahall C; Kim J; Gauthier DJ Sci Adv; 2017 Nov; 3(11):e1701491. PubMed ID: 29202028 [TBL] [Abstract][Full Text] [Related]
6. Reference-frame-independent, measurement-device-independent quantum key distribution using fewer quantum states. Lee D; Hong S; Cho YW; Lim HT; Han SW; Jung H; Moon S; Lee KJ; Kim YS Opt Lett; 2020 May; 45(9):2624-2627. PubMed ID: 32356832 [TBL] [Abstract][Full Text] [Related]
7. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
8. Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Wang Q; Chen W; Xavier G; Swillo M; Zhang T; Sauge S; Tengner M; Han ZF; Guo GC; Karlsson A Phys Rev Lett; 2008 Mar; 100(9):090501. PubMed ID: 18352685 [TBL] [Abstract][Full Text] [Related]
9. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions. Yin HL; Cao WF; Fu Y; Tang YL; Liu Y; Chen TY; Chen ZB Opt Lett; 2014 Sep; 39(18):5451-4. PubMed ID: 26466295 [TBL] [Abstract][Full Text] [Related]
10. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement. Li W; Wang L; Zhao S Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069 [TBL] [Abstract][Full Text] [Related]
11. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sun SH; Jiang MS; Ma XC; Li CY; Liang LM Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767 [TBL] [Abstract][Full Text] [Related]
12. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248 [TBL] [Abstract][Full Text] [Related]
13. Finite-key analysis for twin-field quantum key distribution with composable security. Yin HL; Chen ZB Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131 [TBL] [Abstract][Full Text] [Related]