1. Ahmadi H., Safavi-Naini R.: Secret keys from channel noise. In: Proceedings of the 30th Annual international conference on Theory and Applications of Cryptographic Techniques: Advances in Cryptology, EUROCRYPT’11, pp. 266–283. Springer, Berlin, Heidelberg (2011). http://dl.acm.org/citation.cfm?id=2008684.2008706 .
2. Alléaume R., Lütkenhaus N., Renner R., Grangier P., Debuisschert T., Ribordy G., Gisin N., Painchault P., Pornin T., Slavail L., Riguidel M., Shilds A., Länger T., Peev M., Dianati M., Leverrier A., Poppe A., Bouda J., Branciard C., Godfrey M., Rarity J., Weinfurter H., Zeilinger A., Monyk C.: Quantum key distribution and cryptography: a survey. In: Braunstein S.L., Loc H.K., Paterson K., Ryan P. (eds.) Classical and Quantum Information Assurance Foundations and Practice, No. 09311 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl—Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2010). http://drops.dagstuhl.de/opus/volltexte/2010/2361 .
3. Amazon web services.: Amazon simple storage service (amazon s3) (2012). http://aws.amazon.com/s3 . Accessed 20 June 2012.
4. Armengol J.M.P., Furch B., de Matos C.J., Minster O., Cacciapuoti L., Pfennigbauer M., Aspelmeyer M., Jennewein T., Ursin R., Schmitt-Manderbach T., Baister G., Rarity J., Leeb W., Barbieri C., Weinfurter H., Zeilinger A.: Quantum communications at esa: towards a space experiment on the iss. Acta Astronaut. 63(1–4), 165–178 (2008)
5. Aumann Y., Ding Y.Z., Rabin M.O.: Everlasting security in the bounded storage model. IEEE Trans. Inform. Theory 48(6), 1668–1680 (2002). doi: 10.1109/TIT.2002.1003845