1. 1. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).
2. 2. A. K. Ekert, “Quantum cryptography based on Bell's theorem,” Phys. Rev. Lett. 67, 661–663 (1991).
3. 3. S. Kak, “Quantum key distribution using three basis states,” Pramana 54, 709–713 (2000); quant-ph/9902038.
4. 4. A. Poppe et al., “Practical quantum key distribution with polarization entangled photons,” quant-ph/0404115.
5. 5. K. Svozil, “The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks,” quant-ph/0501062.