These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
159 related articles for article (PubMed ID: 37998210)
1. Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station. Stipčević M Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998210 [TBL] [Abstract][Full Text] [Related]
2. Source-independent quantum random number generator against tailored detector blinding attacks. Liu WB; Lu YS; Fu Y; Huang SC; Yin ZJ; Jiang K; Yin HL; Chen ZB Opt Express; 2023 Mar; 31(7):11292-11307. PubMed ID: 37155768 [TBL] [Abstract][Full Text] [Related]
3. Feasible attack on detector-device-independent quantum key distribution. Wei K; Liu H; Ma H; Yang X; Zhang Y; Sun Y; Xiao J; Ji Y Sci Rep; 2017 Mar; 7(1):449. PubMed ID: 28348408 [TBL] [Abstract][Full Text] [Related]
4. Quantum man-in-the-middle attack on the calibration process of quantum key distribution. Fei YY; Meng XD; Gao M; Wang H; Ma Z Sci Rep; 2018 Mar; 8(1):4283. PubMed ID: 29523828 [TBL] [Abstract][Full Text] [Related]
5. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness. Jiang XL; Wang Y; Lu YF; Li JJ; Zhou C; Bao WS Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420359 [TBL] [Abstract][Full Text] [Related]
6. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack. Miroshnichenko GP; Kozubov AV; Gaidash AA; Gleim AV; Horoshko DB Opt Express; 2018 Apr; 26(9):11292-11308. PubMed ID: 29716053 [TBL] [Abstract][Full Text] [Related]
7. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination. Wu Z; Huang A; Chen H; Sun SH; Ding J; Qiang X; Fu X; Xu P; Wu J Opt Express; 2020 Aug; 28(17):25574-25590. PubMed ID: 32907074 [TBL] [Abstract][Full Text] [Related]
8. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. V AD; V K Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585 [TBL] [Abstract][Full Text] [Related]
9. Counterfactual quantum key distribution with untrusted detectors. Lin YQ; Wang M; Yang XQ; Liu HW Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753 [TBL] [Abstract][Full Text] [Related]
10. A Review of Security Evaluation of Practical Quantum Key Distribution System. Sun S; Huang A Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554 [TBL] [Abstract][Full Text] [Related]
11. On the security of semi-device-independent QKD protocols. Chaturvedi A; Ray M; Veynar R; Pawłowski M Quantum Inf Process; 2018; 17(6):131. PubMed ID: 31007638 [TBL] [Abstract][Full Text] [Related]
12. Randomness determines practical security of BB84 quantum key distribution. Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359 [TBL] [Abstract][Full Text] [Related]
13. A universal setup for active control of a single-photon detector. Liu Q; Lamas-Linares A; Kurtsiefer C; Skaar J; Makarov V; Gerhardt I Rev Sci Instrum; 2014 Jan; 85(1):013108. PubMed ID: 24517746 [TBL] [Abstract][Full Text] [Related]
15. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248 [TBL] [Abstract][Full Text] [Related]
16. Quantum key distribution with hacking countermeasures and long term field trial. Dixon AR; Dynes JF; Lucamarini M; Fröhlich B; Sharpe AW; Plews A; Tam W; Yuan ZL; Tanizawa Y; Sato H; Kawamura S; Fujiwara M; Sasaki M; Shields AJ Sci Rep; 2017 May; 7(1):1978. PubMed ID: 28512308 [TBL] [Abstract][Full Text] [Related]
18. Quantum key distribution with prepare-and-measure Bell test. Tan YG Sci Rep; 2016 Oct; 6():35032. PubMed ID: 27733771 [TBL] [Abstract][Full Text] [Related]
19. Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis. Zheng Y; Shi H; Pan W; Wang Q; Mao J Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33573307 [TBL] [Abstract][Full Text] [Related]
20. High-rate intercity quantum key distribution with a semiconductor single-photon source. Yang J; Jiang Z; Benthin F; Hanel J; Fandrich T; Joos R; Bauer S; Kolatschek S; Hreibi A; Rugeramigabo EP; Jetter M; Portalupi SL; Zopf M; Michler P; Kück S; Ding F Light Sci Appl; 2024 Jul; 13(1):150. PubMed ID: 38956020 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]