[1] A. Bennett, G. Brassard, and L. Salvail, "Experimental quantum key distribution," in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pages 123–127, 1989.
[2] C. H. Bennett, G. Brassard, and J. A. De Marco, "Quantum cryptography: Public key distribution and signature," in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pages 128–133, 1992.
[3] V. Gilles, "Quantum cryptography," in Quantum Computing: A Research Companion, edited by V. Vedral, pages 331–348. Wiley, 2003.
[4] A. Yao, "rotocols for secure computation over an insecure channel," in Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, pages 397–407, 1981.
[5] A. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computation Theory, pages 411–419, 1991.
[6] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[7] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[8] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[9] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[10] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[11] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[12] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[13] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[14] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[15] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[16] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[17] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[18] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[19] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[20] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[21] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[22] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[23] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[24] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[25] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[26] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[27] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[28] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[29] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[30] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[31] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[32] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[33] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[34] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[35] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[36] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[37] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[38] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[39] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[40] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[41] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[42] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[43] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[44] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[45] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[46] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[47] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[48] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[49] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[50] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings of the 37th IEEE Annual Symposium on Foundations of Computer Science, pages 388–395, 1996.
[51] G. L. Long, "Quantum cryptography," in Handbook of Applied Cryptography, edited by A. Menezes, P. van Oorschot, and S. Vanstone, pages 687–746. CRC Press, 1996.
[52] A. K. Ekert, "Quantum cryptography based on Bell's theorem," in Proceedings of the 28th Annual IEEE International Symposium on Fundamentals of Computer Science, pages 411–419, 1991.
[53] C. H. Bennett, G. Brassard, and S. Wiesner, "Quantum cryptography: Public key distribution and signature," in Proceedings of the 25th Annual Symposium on Foundations of Computer Science, pages 326–334, 1984.
[54] W. K. Wootters, "The concept of entanglement," in Proceedings of the International School of Physics "Enrico Fermi", Course LXXXVIII, pages 1–23, 1997.
[55] R. Jozsa, "Quantum mappings and quantum money," in Proceedings of the 29th Annual IEEE Symposium on Foundations of Computer Science, pages 289–296, 1988.
[56] A. K. Ekert, "Quantum cryptography using two-state systems," in Proceedings