8 citations to https://www.mathnet.ru/eng/ljm207
  1. D. A. Kronberg, “On the Structure of Postselective Transformations of Quantum States”, Proc. Steklov Inst. Math., 324 (2024), 123–134  mathnet  crossref  crossref  mathscinet  zmath
  2. D. A. Kronberg, “Vulnerability of quantum cryptography with phase–time coding under attenuation conditions”, Theoret. and Math. Phys., 214:1 (2023), 121–131  mathnet  crossref  crossref  mathscinet  adsnasa
  3. D. A. Kronberg, “Success probability for postselective transformations of pure quantum states”, Phys. Rev. A, 106:4 (2022), 42447–6  mathnet  crossref
  4. D. A. Kronberg, “Comment on “Practical quantum key distribution with geometrically uniform states””, Phys. Rev. A, 104:2 (2021), 26401–3  mathnet  crossref  isi  scopus
  5. Anton Kozubov, Andrei Gaidash, George Miroshnichenko, “Quantum control attack: Towards joint estimation of protocol and hardware loopholes”, Phys. Rev. A, 104:2 (2021), 22603–6  mathnet  crossref  isi  scopus
  6. A. S. Avanesov, D. A. Kronberg, “On eavesdropping strategy for symmetric coherent states quantum cryptography using heterodyne measurement”, Lobachevskii J. Math., 42:10 (2021), 2285–2294  mathnet  crossref  isi  scopus
  7. Cheng Teng, Wang Xiuwen, Shi Qin, Chen Jiong, Sun Lei, Hou Dengchao, Huang He, Jiang Junzhao, Wu Bofu, 2021 5th CAA International Conference on Vehicular Control and Intelligence (CVCI), 2021, 1  crossref
  8. K. S. Kravtsov, S. N. Molotkov, “Reply to “Comment on ‘Practical quantum key distribution with geometrically uniform states' ””, Phys. Rev. A, 104:2 (2021)  crossref