{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:42:49Z","timestamp":1767678169463,"version":"3.48.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100007251","name":"Basic Research Program at the National Research University Higher School of Economics","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007251","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2025.3648803","type":"journal-article","created":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T18:24:39Z","timestamp":1766773479000},"page":"343-354","source":"Crossref","is-referenced-by-count":0,"title":["Adaptation of Error Correction Procedures to the Time-Bin Quantum Key Distribution Protocol Implementation"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-5711","authenticated-orcid":false,"given":"Vladimir I.","family":"Morozov","sequence":"first","affiliation":[{"name":"HSE University, Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0849-9251","authenticated-orcid":false,"given":"Mikhail S.","family":"Elezov","sequence":"additional","affiliation":[{"name":"HSE University, Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg O.","family":"Evsutin","sequence":"additional","affiliation":[{"name":"HSE University, Moscow, Russia"}]},{"given":"Roman V.","family":"Ozhegov","sequence":"additional","affiliation":[{"name":"HSE University, Moscow, Russia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1063\/1.2126792"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.022317"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1364\/OE.496723"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1701491"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1364\/OL.44.002398"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.94.035001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-025-08739-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1063\/1.5027030"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1134\/S1063776119070124"},{"issue":"128","key":"ref17","first-page":"553","article-title":"Challenges of creating a quantum key distribution system for long-distance trunk line","volume":"17","author":"Nefedov","year":"2024","journal-title":"Nanoindustry"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1134\/S0032946025010028"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.4238"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-56637-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04438-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3021142"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSE58435.2023.10211941"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.836667"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/WCN.2005.789"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/e25010031"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/e26010053"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_35"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2016.7495702"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/382780.382781"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0011-3"},{"issue":"5","key":"ref35","first-page":"961","article-title":"On the breidbart eavesdropping problem of the extended BB84 QKD protocol","volume":"51","author":"Yang","year":"2002","journal-title":"Acta Phys. Sinica"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0033-z"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289451"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-020-02919-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-019-2342-2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-024-04395-w"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC57237.2023.10273570"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/math12142243"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.01.060685"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3502712"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102348"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230503"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012326"},{"key":"ref48","article-title":"QKD security proofs for decoy-state BB84: Protocol variations, proof techniques, gaps and limitations","author":"Tupkary","year":"2025","journal-title":"arXiv:2502.10340"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1103\/2pzb-ssrs"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/26.768759"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.804244"},{"volume-title":"5G; NR; Multiplexing and Channel Coding (3GPP TS 38.212 Version 19.1.0 Release 19)","year":"2025","key":"ref53"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11316506.pdf?arnumber=11316506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:39:37Z","timestamp":1767677977000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3648803","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2026]]}}}