↑Bennett, C.H. and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, page 8. New York, 1984.
↑Ekert. A. Physical Review Letters, 67, pp.661-663, (1991)
↑Kak, S., A three-stage quantum cryptography protocol. Foundations of Physics Letters, vol. 19, pp.293-296, 2006.
↑Chen, Y. et al., Embedded security framework for integrated classical and quantum cryptography in optical burst switching networks. Security and Communication Networks, vol. 2, pp. 546-554, 2009.
↑
Brassard, Gilles; Claude, Crépeau; Jozsa, Richard; Langlois, Denis (1993). A Quantum Bit Commitment Scheme Provably Unbreakable by both Parties. FOCS 1993. IEEE. pp. 362–371.
↑ 11.011.1
Damgård, Ivan; Fehr, Serge; Salvail, Louis; Schaffner, Christian (2005). Cryptography In the Bounded Quantum-Storage Model. FOCS 2005. IEEE. pp. 449–458. A full version is available at arXiv:quant-ph/0508222.
↑
Koenig, Robert; Wehner, Stephanie; Wullschleger, Juerg. "Unconditional security from noisy quantum storage". {{cite web}}: Missing or empty |url= (help)A full version is available at arXiv:0906.1030.
↑
Cachin, Christian; Crépeau, Claude; Marcil, Julien (1998). Oblivious Transfer with a Memory-Bounded Receiver. FOCS 1998. IEEE. pp. 493–502.
↑
Dziembowski, Stefan; Ueli, Maurer (2004). On Generating the Initial Key in the Bounded-Storage Model. Eurocrypt 2004. LNCS. Vol. 3027. Springer. pp. 126–137. Preprint available at [1].
↑
Chandran, Nishanth; Moriarty, Ryan; Goyal, Vipul; Ostrovsky, Rafail (2009). Position-Based Cryptography. A full version is available at IACR eprint:2009/364.
↑
Kent, Adrian; Munro, Bill; Spiller, Tim (2010). "Quantum Tagging with Cryptographically Secure Tags". {{cite web}}: Missing or empty |url= (help) A full version is available at arXiv:1008.2147.
↑
Buhrman, Harry; Chandran, Nishanth; Fehr, Serge; Gelles, Ran; Goyal, Vipul; Ostrovsky, Rafail; Schaffner, Christian (2010). "Position-Based Quantum Cryptography: Impossibility and Constructions". {{cite web}}: Missing or empty |url= (help) A full version is available at arXiv:1009.2490.
↑Beigi, Salman; König, Robert (2011). "Simplified instantaneous non-local quantum computation with applications to position-based cryptography". arXiv:1101.1065.
↑
Mayers, Dominic; Yao, Andrew C.-C. (1998). Quantum Cryptography with Imperfect Apparatus. IEEE Symposium on Foundations of Computer
Science (FOCS). arXiv:quant-ph/9809039. {{cite conference}}: horizontal tab character in |conference= at position 43 (help)