1. Broadbent, A., Fefferman, B., Gagliardoni, T., et al., Des., Codes Cryptogr., 2016, vol. 78, no. 1, p. 351.
2. Bykovsky, A.Yu. and Kompanets, I.N., Quantum Electron., 2018, vol. 48, no. 9, p. 777.
3. Hughes, R.J., Nordholt, J.E., McCabe, P.K., et al., arXiv:1305.0305 [quant-ph].
4. Bedington, R., Arrazola, J.M., and Ling, A., NPJ Quantum Inf., 2017, no. 3, p. 30.
5. Unruh, D., Proc. 33rd Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques (Copenhagen, 2014), Springer, 2014, p. 129.