These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
144 related articles for article (PubMed ID: 37644010)
41. Experimental composable security decoy-state quantum key distribution using time-phase encoding. Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847 [TBL] [Abstract][Full Text] [Related]
42. FL-QKD based on optical-THz biphotons generated by spontaneous parametric downconversion in inter-satellite wireless communication. Liu CJ; Zhu CH; Nie M; Yang H; Pei CX Appl Opt; 2021 Aug; 60(24):7362-7370. PubMed ID: 34613025 [TBL] [Abstract][Full Text] [Related]
43. Automated machine learning for secure key rate in discrete-modulated continuous-variable quantum key distribution. Liu ZP; Zhou MG; Liu WB; Li CL; Gu J; Yin HL; Chen ZB Opt Express; 2022 Apr; 30(9):15024-15036. PubMed ID: 35473234 [TBL] [Abstract][Full Text] [Related]
47. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications. Yu S; Lee J; Lee K; Park K; Park Y Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30248898 [TBL] [Abstract][Full Text] [Related]
48. Measurement-device-independent quantum key distribution with leaky sources. Wang W; Tamaki K; Curty M Sci Rep; 2021 Jan; 11(1):1678. PubMed ID: 33462254 [TBL] [Abstract][Full Text] [Related]
49. Feasible attack on detector-device-independent quantum key distribution. Wei K; Liu H; Ma H; Yang X; Zhang Y; Sun Y; Xiao J; Ji Y Sci Rep; 2017 Mar; 7(1):449. PubMed ID: 28348408 [TBL] [Abstract][Full Text] [Related]
50. Parallel Device-Independent Quantum Key Distribution. Jain R; Miller CA; Shi Y IEEE Trans Inf Theory; 2020; 66(9):. PubMed ID: 33654327 [TBL] [Abstract][Full Text] [Related]
51. Experimental demonstration on the deterministic quantum key distribution based on entangled photons. Chen H; Zhou ZY; Zangana AJ; Yin ZQ; Wu J; Han YG; Wang S; Li HW; He DY; Tawfeeq SK; Shi BS; Guo GC; Chen W; Han ZF Sci Rep; 2016 Feb; 6():20962. PubMed ID: 26860582 [TBL] [Abstract][Full Text] [Related]
53. Quantum key distribution with correlated sources. Pereira M; Kato G; Mizutani A; Curty M; Tamaki K Sci Adv; 2020 Sep; 6(37):. PubMed ID: 32917693 [TBL] [Abstract][Full Text] [Related]
54. From Bell's theorem to secure quantum key distribution. Acín A; Gisin N; Masanes L Phys Rev Lett; 2006 Sep; 97(12):120405. PubMed ID: 17025944 [TBL] [Abstract][Full Text] [Related]
55. Composable security proof for continuous-variable quantum key distribution with coherent States. Leverrier A Phys Rev Lett; 2015 Feb; 114(7):070501. PubMed ID: 25763943 [TBL] [Abstract][Full Text] [Related]
56. One-sided device-independent quantum key distribution for two independent parties. Xin J; Lu XM; Li X; Li G Opt Express; 2020 Apr; 28(8):11439-11450. PubMed ID: 32403655 [TBL] [Abstract][Full Text] [Related]
57. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. Nam J; Choo KK; Paik J; Won D ScientificWorldJournal; 2014; 2014():802359. PubMed ID: 25309956 [TBL] [Abstract][Full Text] [Related]
58. QKD Based on Symmetric Entangled Bernstein-Vazirani. Ampatzis M; Andronikos T Entropy (Basel); 2021 Jul; 23(7):. PubMed ID: 34356411 [TBL] [Abstract][Full Text] [Related]