1. C.H. Bennett, G. Brassard, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), p. 175
2. D. Mayers, J. ACM 48, 351 (2001), preliminary version in Mayers, D. Advances Crytology-Proc. Crypto’96, Lecture Notes in Computer Science, edited by N. Koblitz (Springer-Verlag, New York, 1996), Vol. 1109, pp. 343–357
3. E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, in Proc. of the thirty second annual ACM symposium on Theory of computing (Portland, Oregon, United States, 2000), pp. 715–724
4. H.-K. Lo, H.F. Chau, Science 283, 2050 (1999)
5. P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000), eprint arXiv:quant-ph/0003004