1. Aaronson, S., Atia, Y., Susskind, L.: On the hardness of detecting macroscopic superpositions. Electronic Colloquium on Computational Complexity TR20-146 (2020). https://eccc.weizmann.ac.il/report/2020/146
2. Alagic, G., Gagliardoni, T., Majenz, C.: Can you sign a quantum state? Quantum 5, 603 (2021). https://doi.org/10.22331/q-2021-12-16-603
3. Barooti, K., et al.: Public-key encryption with quantum keys. CoRR abs/2306.07698 (2023). https://doi.org/10.48550/arXiv.2306.07698
4. Bartusek, J., Khurana, D.: Cryptography with certified deletion. CoRR abs/2207.01754 (2022). https://doi.org/10.48550/arXiv.2207.01754
5. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, India, p. 175 (1984)