1. Acin, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., & Scarani, V. (2007). Device-independent security of quantum cryptography against collective attacks. Physical Review Letters, 98, 230501.
2. Aspect, A., Dalibard, J., & Roger, G. (1982). Experimental test of Bell’s inequalities using timevarying analyzers. Physical Review Letters, 49, 1804–1807.
3. Bell, J. S. (1965). On the Einstein-Podolsky-Rosen paradox. Physics, 1, 195–200.
4. Bell, J. S. (2004). Speakable and unspeakable in quantum mechanics: Collected papers on quantum philosophy. Cambridge: Cambridge University Press.
5. Bennett, C. H. & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, 175–179.