These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
151 related articles for article (PubMed ID: 37998248)
1. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Reutov A; Tayduganov A; Mayboroda V; Fat'yanov O Entropy (Basel); 2023 Nov; 25(11):. PubMed ID: 37998248 [TBL] [Abstract][Full Text] [Related]
2. Experimental composable security decoy-state quantum key distribution using time-phase encoding. Yin HL; Liu P; Dai WW; Ci ZH; Gu J; Gao T; Wang QW; Shen ZY Opt Express; 2020 Sep; 28(20):29479-29485. PubMed ID: 33114847 [TBL] [Abstract][Full Text] [Related]
3. Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Gu J; Cao XY; Fu Y; He ZW; Yin ZJ; Yin HL; Chen ZB Sci Bull (Beijing); 2022 Nov; 67(21):2167-2175. PubMed ID: 36545992 [TBL] [Abstract][Full Text] [Related]
4. Proof-of-principle demonstration of parametric down-conversion source-based quantum key distribution over 40 dB channel loss. Zhang CH; Wang D; Zhou XY; Wang S; Zhang LB; Yin ZQ; Chen W; Han ZF; Guo GC; Wang Q Opt Express; 2018 Oct; 26(20):25921-25933. PubMed ID: 30469686 [TBL] [Abstract][Full Text] [Related]
5. A Review of Security Evaluation of Practical Quantum Key Distribution System. Sun S; Huang A Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205554 [TBL] [Abstract][Full Text] [Related]
6. Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction. Wang Y; Du GH; Xu YB; Zhou C; Jiang MS; Li HW; Bao WS Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455123 [TBL] [Abstract][Full Text] [Related]
7. Security evaluation of quantum key distribution with weak basis-choice flaws. Sun SH; Tian ZY; Zhao MS; Ma Y Sci Rep; 2020 Oct; 10(1):18145. PubMed ID: 33097761 [TBL] [Abstract][Full Text] [Related]
8. Security analysis of quantum key distribution on passive optical networks. Lim K; Ko H; Suh C; Rhee JK Opt Express; 2017 May; 25(10):11894-11909. PubMed ID: 28788747 [TBL] [Abstract][Full Text] [Related]
13. Counterfactual quantum key distribution with untrusted detectors. Lin YQ; Wang M; Yang XQ; Liu HW Heliyon; 2023 Feb; 9(2):e13719. PubMed ID: 36879753 [TBL] [Abstract][Full Text] [Related]
14. Patterning-effect mitigating intensity modulator for secure decoy-state quantum key distribution. Roberts GL; Pittaluga M; Minder M; Lucamarini M; Dynes JF; Yuan ZL; Shields AJ Opt Lett; 2018 Oct; 43(20):5110-5113. PubMed ID: 30320832 [TBL] [Abstract][Full Text] [Related]
15. Security of quantum key distribution with multiphoton components. Yin HL; Fu Y; Mao Y; Chen ZB Sci Rep; 2016 Jul; 6():29482. PubMed ID: 27383014 [TBL] [Abstract][Full Text] [Related]
16. Proof-of-Principle Demonstration of Fully Passive Quantum Key Distribution. Hu C; Wang W; Chan KS; Yuan Z; Lo HK Phys Rev Lett; 2023 Sep; 131(11):110801. PubMed ID: 37774309 [TBL] [Abstract][Full Text] [Related]
17. Security of six-state quantum key distribution protocol with threshold detectors. Kato G; Tamaki K Sci Rep; 2016 Jul; 6():30044. PubMed ID: 27443610 [TBL] [Abstract][Full Text] [Related]
18. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources. Liu L; Guo FZ; Wen QY Sci Rep; 2017 Sep; 7(1):11370. PubMed ID: 28900106 [TBL] [Abstract][Full Text] [Related]
19. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sun SH; Jiang MS; Ma XC; Li CY; Liang LM Sci Rep; 2014 Apr; 4():4759. PubMed ID: 24755767 [TBL] [Abstract][Full Text] [Related]
20. Randomness determines practical security of BB84 quantum key distribution. Li HW; Yin ZQ; Wang S; Qian YJ; Chen W; Guo GC; Han ZF Sci Rep; 2015 Nov; 5():16200. PubMed ID: 26552359 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]