[1]
C.H. Bennett and G. Brassard: Quantum Cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, (1984), p.175.
Google Scholar
[2]
C. Branciard, N. Gisin, B. Kraus, V. Scarani: Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, 72 (3), (2005).
DOI: 10.1103/physreva.72.032301
Google Scholar
[3]
S. Valerio, A. Antonio, R. Grégoire and G. Nicolas: Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Phys. Rev. Lett. 92, 057901 (2004).
DOI: 10.1103/physrevlett.92.057901
Google Scholar
[4]
G. Brassard and L. Salvail: Secret key reconciliation by public discussion, Advances in Cryptology: Eurocrypt 93 Proc. (1993), pp.410-23.
DOI: 10.1007/3-540-48285-7_35
Google Scholar
[5]
A. Romain, et al: SECOQC White Paper on Quantum Key Distribution and Cryptography, arXiv: quant-ph/0701168v1, (2007), p.7.
Google Scholar
[6]
D. Huang, Z. Chen, Y. Guo and M. Lee: Quantum Secure Direct Communication Based on Chaos with Authentication, Journal of the Physical Society of Japan, Vol. 76, No. 12, (2007).
DOI: 10.1143/jpsj.76.124001
Google Scholar
[7]
Y. Zhao, C.H. F. Fung, B. Qi, C. Chen, and H. -K. Lo, Phys. Rev. A, 78: 042333, (2008).
Google Scholar
[8]
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar and V. Makarov, Opt. Exp. 18, 27938, (2010).
DOI: 10.1364/oe.18.027938
Google Scholar
[9]
C. Wiechers, L. Lydersen, C. Wittmann, D. Elser, J. Skaar, Ch. Marquardt, V. Makarov and G. Leuchs, New J. Phys. 13, 013043, (2011).
DOI: 10.1088/1367-2630/13/1/013043
Google Scholar
[10]
N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser, Ch. Marquardt, V. Makarov and G. Leuchs, Phys. Rev. Lett. 107, 110501, (2011).
DOI: 10.1103/physrevlett.107.110501
Google Scholar