These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 37644010)

  • 1. Security of quantum key distribution from generalised entropy accumulation.
    Metger T; Renner R
    Nat Commun; 2023 Aug; 14(1):5272. PubMed ID: 37644010
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quantum key distribution with hacking countermeasures and long term field trial.
    Dixon AR; Dynes JF; Lucamarini M; Fröhlich B; Sharpe AW; Plews A; Tam W; Yuan ZL; Tanizawa Y; Sato H; Kawamura S; Fujiwara M; Sasaki M; Shields AJ
    Sci Rep; 2017 May; 7(1):1978. PubMed ID: 28512308
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Counterfactual quantum key distribution with untrusted detectors.
    Lin YQ; Wang M; Yang XQ; Liu HW
    Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Phase Matching Quantum Key Distribution based on Single-Photon Entanglement.
    Li W; Wang L; Zhao S
    Sci Rep; 2019 Oct; 9(1):15466. PubMed ID: 31664069
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.
    Wu Z; Huang A; Chen H; Sun SH; Ding J; Qiang X; Fu X; Xu P; Wu J
    Opt Express; 2020 Aug; 28(17):25574-25590. PubMed ID: 32907074
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Experimental quantum key distribution certified by Bell's theorem.
    Nadlinger DP; Drmota P; Nichol BC; Araneda G; Main D; Srinivas R; Lucas DM; Ballance CJ; Ivanov K; Tan EY; Sekatski P; Urbanke RL; Renner R; Sangouard N; Bancal JD
    Nature; 2022 Jul; 607(7920):682-686. PubMed ID: 35896644
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources.
    Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB
    Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit.
    Maeda K; Sasaki T; Koashi M
    Nat Commun; 2019 Jul; 10(1):3140. PubMed ID: 31316074
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Efficient Routing Protocol for Quantum Key Distribution Networks.
    Yao J; Wang Y; Li Q; Mao H; El-Latif AAA; Chen N
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885133
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Application and Development of QKD-Based Quantum Secure Communication.
    Lai J; Yao F; Wang J; Zhang M; Li F; Zhao W; Zhang H
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190415
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Finite-key analysis for twin-field quantum key distribution with composable security.
    Yin HL; Chen ZB
    Sci Rep; 2019 Nov; 9(1):17113. PubMed ID: 31745131
    [TBL] [Abstract][Full Text] [Related]  

  • 12. On the security of semi-device-independent QKD protocols.
    Chaturvedi A; Ray M; Veynar R; Pawłowski M
    Quantum Inf Process; 2018; 17(6):131. PubMed ID: 31007638
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator.
    Hajomer AAE; Derkach I; Jain N; Chin HM; Andersen UL; Gehring T
    Sci Adv; 2024 Jan; 10(1):eadi9474. PubMed ID: 38170766
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.
    Stipčević M
    Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998210
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Finite-Key Analysis for Quantum Key Distribution with Discrete-Phase Randomization.
    Wang RQ; Yin ZQ; Jin XH; Wang R; Wang S; Chen W; Guo GC; Han ZF
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832625
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Fully device-independent quantum key distribution.
    Vazirani U; Vidick T
    Phys Rev Lett; 2014 Oct; 113(14):140501. PubMed ID: 25325625
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Finite-size security of continuous-variable quantum key distribution with digital signal processing.
    Matsuura T; Maeda K; Sasaki T; Koashi M
    Nat Commun; 2021 Jan; 12(1):252. PubMed ID: 33441559
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography.
    Kon WY; Lim CCW
    Entropy (Basel); 2020 Dec; 23(1):. PubMed ID: 33396236
    [TBL] [Abstract][Full Text] [Related]  

  • 19. General immunity and superadditivity of two-way Gaussian quantum cryptography.
    Ottaviani C; Pirandola S
    Sci Rep; 2016 Mar; 6():22225. PubMed ID: 26928053
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Collective attacks and unconditional security in continuous variable quantum key distribution.
    Grosshans F
    Phys Rev Lett; 2005 Jan; 94(2):020504. PubMed ID: 15698157
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.