1. Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on the Foundations of Computer Science, pp 124–134. IEEE Computer Society Press, Los Alamitos, CA (1994)
2. Bennett, C. H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers (1984)
3. Shor, P. W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
4. Ekert, A. K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)
5. Bennett, C., Brassard, G., Mermin, N.: Quantum cryptography without bell’s theorem. In: Proceedings of 35th Annual Symposium on the Foundations of Computer Science, pp 124–134. IEEE Computer Society Press, Los Alamitos, CA (1994)