Format
Sort by
Items per page

Send to

Choose Destination

Links from PubMed

Items: 1 to 20 of 134

1.
2.

Composable security proof for continuous-variable quantum key distribution with coherent States.

Leverrier A.

Phys Rev Lett. 2015 Feb 20;114(7):070501. Epub 2015 Feb 19.

PMID:
25763943
3.

Postselection technique for quantum channels with applications to quantum cryptography.

Christandl M, König R, Renner R.

Phys Rev Lett. 2009 Jan 16;102(2):020504. Epub 2009 Jan 14.

PMID:
19257257
4.

Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

Furrer F, Franz T, Berta M, Leverrier A, Scholz VB, Tomamichel M, Werner RF.

Phys Rev Lett. 2012 Sep 7;109(10):100502. Epub 2012 Sep 5. Erratum in: Phys Rev Lett. 2014 Jan 10;112(1):019902.

PMID:
23005270
5.

Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.

Kraus B, Gisin N, Renner R.

Phys Rev Lett. 2005 Aug 19;95(8):080501. Epub 2005 Aug 15.

PMID:
16196841
6.

Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

Leverrier A.

Phys Rev Lett. 2017 May 19;118(20):200501. doi: 10.1103/PhysRevLett.118.200501. Epub 2017 May 16.

PMID:
28581779
7.

Unconditional security of a three state quantum key distribution protocol.

Boileau JC, Tamaki K, Batuwantudawe J, Laflamme R, Renes JM.

Phys Rev Lett. 2005 Feb 4;94(4):040503. Epub 2005 Jan 31.

PMID:
15783540
8.

Collective attacks and unconditional security in continuous variable quantum key distribution.

Grosshans F.

Phys Rev Lett. 2005 Jan 21;94(2):020504. Epub 2005 Jan 21.

PMID:
15698157
9.

De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography.

Renner R, Cirac JI.

Phys Rev Lett. 2009 Mar 20;102(11):110504. Epub 2009 Mar 19.

PMID:
19392183
10.

Security of continuous-variable quantum key distribution against general attacks.

Leverrier A, García-Patrón R, Renner R, Cerf NJ.

Phys Rev Lett. 2013 Jan 18;110(3):030502. Epub 2013 Jan 18.

PMID:
23373907
11.

Structured codes improve the Bennett-Brassard-84 quantum key rate.

Smith G, Renes JM, Smolin JA.

Phys Rev Lett. 2008 May 2;100(17):170502. Epub 2008 Apr 28.

PMID:
18518263
12.

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

Gehring T, Händchen V, Duhme J, Furrer F, Franz T, Pacher C, Werner RF, Schnabel R.

Nat Commun. 2015 Oct 30;6:8795. doi: 10.1038/ncomms9795.

13.

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

Scarani V, Acín A, Ribordy G, Gisin N.

Phys Rev Lett. 2004 Feb 6;92(5):057901. Epub 2004 Feb 6.

PMID:
14995344
14.

Finite-key analysis for measurement-device-independent quantum key distribution.

Curty M, Xu F, Cui W, Lim CC, Tamaki K, Lo HK.

Nat Commun. 2014 Apr 29;5:3732. doi: 10.1038/ncomms4732.

PMID:
24776959
15.

Tight finite-key analysis for quantum cryptography.

Tomamichel M, Lim CC, Gisin N, Renner R.

Nat Commun. 2012 Jan 17;3:634. doi: 10.1038/ncomms1631.

16.

Experimental quantum key distribution with finite-key security analysis for noisy channels.

Bacco D, Canale M, Laurenti N, Vallone G, Villoresi P.

Nat Commun. 2013;4:2363. doi: 10.1038/ncomms3363.

PMID:
24008848
17.

Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.

Leverrier A, Grangier P.

Phys Rev Lett. 2009 May 8;102(18):180504. Epub 2009 May 6. Erratum in: Phys Rev Lett. 2011 Jun 24;106(25):259902.

PMID:
19518854
18.

Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography.

Pirandola S, Braunstein SL, Lloyd S.

Phys Rev Lett. 2008 Nov 14;101(20):200504. Epub 2008 Nov 14.

PMID:
19113324
19.

Device-independent security of quantum cryptography against collective attacks.

Acín A, Brunner N, Gisin N, Massar S, Pironio S, Scarani V.

Phys Rev Lett. 2007 Jun 8;98(23):230501. Epub 2007 Jun 4.

PMID:
17677888
20.

General immunity and superadditivity of two-way Gaussian quantum cryptography.

Ottaviani C, Pirandola S.

Sci Rep. 2016 Mar 1;6:22225. doi: 10.1038/srep22225.

Supplemental Content

Support Center