These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 37372300)

  • 21. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 22. No signaling and quantum key distribution.
    Barrett J; Hardy L; Kent A
    Phys Rev Lett; 2005 Jul; 95(1):010503. PubMed ID: 16090597
    [TBL] [Abstract][Full Text] [Related]  

  • 23. On the Security of Offloading Post-Processing for Quantum Key Distribution.
    Lorünser T; Krenn S; Pacher C; Schrenk B
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832593
    [TBL] [Abstract][Full Text] [Related]  

  • 24. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
    Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW
    Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Design and verification of TCP/IP offload engine in quantum key distribution system.
    Zhong X; Chen L; Li Y; Jin G
    Rev Sci Instrum; 2019 Nov; 90(11):115102. PubMed ID: 31779456
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A novel image encryption scheme based on quantum dynamical spinning and rotations.
    Khan M; Waseem HM
    PLoS One; 2018; 13(11):e0206460. PubMed ID: 30452455
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Short Review on Quantum Key Distribution Protocols.
    Giampouris D
    Adv Exp Med Biol; 2017; 988():149-157. PubMed ID: 28971396
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Quantum cryptography with structured photons through a vortex fiber.
    Sit A; Fickler R; Alsaiari F; Bouchard F; Larocque H; Gregg P; Yan L; Boyd RW; Ramachandran S; Karimi E
    Opt Lett; 2018 Sep; 43(17):4108-4111. PubMed ID: 30160728
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Authentication of variable length messages in quantum key distribution.
    Bibak K; Kapron BM; Srinivasan V
    EPJ Quantum Technol; 2022; 9(1):8. PubMed ID: 35224512
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Improved security bound for the round-robin-differential-phase-shift quantum key distribution.
    Yin ZQ; Wang S; Chen W; Han YG; Wang R; Guo GC; Han ZF
    Nat Commun; 2018 Jan; 9(1):457. PubMed ID: 29386505
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Measurement-device-independent quantum communication without encryption.
    Niu PH; Zhou ZR; Lin ZS; Sheng YB; Yin LG; Long GL
    Sci Bull (Beijing); 2018 Oct; 63(20):1345-1350. PubMed ID: 36658905
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Weak randomness impacts the security of reference-frame-independent quantum key distribution.
    Zhang CM; Wang WB; Li HW; Wang Q
    Opt Lett; 2019 Mar; 44(5):1226-1229. PubMed ID: 30821754
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Laser damage helps the eavesdropper in quantum cryptography.
    Bugge AN; Sauge S; Ghazali AM; Skaar J; Lydersen L; Makarov V
    Phys Rev Lett; 2014 Feb; 112(7):070503. PubMed ID: 24579579
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Unconditional security of a three state quantum key distribution protocol.
    Boileau JC; Tamaki K; Batuwantudawe J; Laflamme R; Renes JM
    Phys Rev Lett; 2005 Feb; 94(4):040503. PubMed ID: 15783540
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Application and Development of QKD-Based Quantum Secure Communication.
    Lai J; Yao F; Wang J; Zhang M; Li F; Zhao W; Zhang H
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190415
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Quantum communication with coherent states of light.
    Khan I; Elser D; Dirmeier T; Marquardt C; Leuchs G
    Philos Trans A Math Phys Eng Sci; 2017 Aug; 375(2099):. PubMed ID: 28652491
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Eavesdropping and countermeasures for backflash side channel in quantum cryptography.
    Pinheiro PVP; Chaiwongkhot P; Sajeed S; Horn RT; Bourgoin JP; Jennewein T; Lütkenhaus N; Makarov V
    Opt Express; 2018 Aug; 26(16):21020-21032. PubMed ID: 30119408
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Device-independent security of quantum cryptography against collective attacks.
    Acín A; Brunner N; Gisin N; Massar S; Pironio S; Scarani V
    Phys Rev Lett; 2007 Jun; 98(23):230501. PubMed ID: 17677888
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Experimental quantum key distribution certified by Bell's theorem.
    Nadlinger DP; Drmota P; Nichol BC; Araneda G; Main D; Srinivas R; Lucas DM; Ballance CJ; Ivanov K; Tan EY; Sekatski P; Urbanke RL; Renner R; Sangouard N; Bancal JD
    Nature; 2022 Jul; 607(7920):682-686. PubMed ID: 35896644
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Quantum enigma machine: Experimentally demonstrating quantum data locking.
    Lum DJ; Howell JC; Allman MS; Gerrits T; Verma VB; Nam SW; Lupo C; Lloyd S
    Phys Rev A (Coll Park); 2016; 94():. PubMed ID: 31093584
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.