1. Barenco, A., Bennett, C.H., Cleve, R., Divincenzo, D. P., Margolus, N., Shor, P., Sleator, T., Smolin, J., and Weinfurter, H. Elementary Gates for Quantum Computation. Physical Review A 52,5 (Nov. 1995), 3457–3467.
2. Lect Notes Comput Sci;M. Bellare,1993
3. Bellare, M., AND Rogaway, P. Optimal Asymmetric Encryption-How to Encrypt with RSA. In Advances in Cryptology—EUROCRYPT’94 (1994), pp. 92–111.
4. Bellare, M., Desai, A., Pointcheval, D., AND Rogaway, P. Relations among Notions of Security for Public-Key Encryption Schemes. In Advances in Cryptology—CRYPTO’98 (1998), pp. 26–45.
5. Bennett, C. H., Bernstein, E., Brassard, G., AND Vazirani, U. Strengths and weaknesses of quantum computing. SI AM J. Comput. 26,5 (Oct. 1997), 1510–1523.