These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 37372300)

  • 1. Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data.
    Pastushenko VA; Kronberg DA
    Entropy (Basel); 2023 Jun; 25(6):. PubMed ID: 37372300
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Practical quantum key distribution protocol without monitoring signal disturbance.
    Sasaki T; Yamamoto Y; Koashi M
    Nature; 2014 May; 509(7501):475-8. PubMed ID: 24848060
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Quantum-locked key distribution at nearly the classical capacity rate.
    Lupo C; Lloyd S
    Phys Rev Lett; 2014 Oct; 113(16):160502. PubMed ID: 25361242
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
    Gerhardt I; Liu Q; Lamas-Linares A; Skaar J; Kurtsiefer C; Makarov V
    Nat Commun; 2011 Jun; 2():349. PubMed ID: 21673670
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Quantum Oblivious Transfer: A Short Review.
    Santos MB; Mateus P; Pinto AN
    Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885167
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.
    Adu-Kyere A; Nigussie E; Isoaho J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36016045
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded.
    Vergoossen T; Bedington R; Grieve JA; Ling A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267101
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure key distribution exploiting error rate criticality for radio frequency links.
    Stevens CJ; Allen B; Brown AK
    R Soc Open Sci; 2023 Oct; 10(10):230411. PubMed ID: 37859839
    [TBL] [Abstract][Full Text] [Related]  

  • 9. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
    Kon WY; Lim CCW
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Analysis of quantum key distribution based on unified model of sequential state discrimination strategy.
    Namkung M; Kwon Y
    Sci Rep; 2024 May; 14(1):10254. PubMed ID: 38704406
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Quantum man-in-the-middle attack on the calibration process of quantum key distribution.
    Fei YY; Meng XD; Gao M; Wang H; Ma Z
    Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Demonstration of microwave single-shot quantum key distribution.
    Fesquet F; Kronowetter F; Renger M; Yam WK; Gandorfer S; Inomata K; Nakamura Y; Marx A; Gross R; Fedorov KG
    Nat Commun; 2024 Aug; 15(1):7544. PubMed ID: 39214975
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A quantum encryption design featuring confusion, diffusion, and mode of operation.
    Hu Z; Kais S
    Sci Rep; 2021 Dec; 11(1):23774. PubMed ID: 34893658
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings' Problem.
    Yoshida M; Nakayama A; Cheng J
    Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287043
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Post-Quantum Security: Opportunities and Challenges.
    Li S; Chen Y; Chen L; Liao J; Kuang C; Li K; Liang W; Xiong N
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960442
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Entangled state quantum cryptography: eavesdropping on the ekert protocol.
    Naik DS; Peterson CG; White AG; Berglund AJ; Kwiat PG
    Phys Rev Lett; 2000 May; 84(20):4733-6. PubMed ID: 10990783
    [TBL] [Abstract][Full Text] [Related]  

  • 18. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
    Pavičić M
    Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573044
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams.
    Green A; Lawrence J; Siopsis G; Peters NA; Passian A
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139664
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Quantum cryptography beyond quantum key distribution.
    Broadbent A; Schaffner C
    Des Codes Cryptogr; 2016; 78(1):351-382. PubMed ID: 32226229
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.