[1] Wiesner S. Conjugate coding [J].Sigact News,1983,15(1): 78-88.
[2] Wooters W K,Zurek W H. A single quantum cannot be cloned [J].Nature,1982,299: 802-803.
[3] Liitkenhaus N. Security against eavesdropp ing in quantum cryp tography [J].Phys. Rev. A,1996,54: 972111.
[4] Lütkenhaus N. Estimates for pract ical quantum cryp tography [J].Phys. Rev. A,1999,59: 330123319.
[5] Brassard G,Lütkenhaus N,Mor T,et al. Security aspects of practical quantum cryptography [DB/OL].http://arxiv.org/df quant-ph/9911054,1999211.
[6] Hankerson D,Menezes A,Vanstone S. Guide to Elliptic Curve Cryptography [M].Heidelberg: Springer,2004.Gisin N,Ribordy G,Tittel W,et al. Quantum cryptography [DK].Eprint quant-ph/0101098.
[7] Bennett C H,Brassard G. Quantum cryptography:public key distribution and cointossing [C].Proc. IEEE Int.Conf. Computers,Systems and Signal Processing(Bangalore. India),1984,175-179.
[8] Bennett C H. Quantum cryptography using any two non-orthogonal states [J].Phys. Rev. Left.,1992,68:3121-3124.
[9] Bruss D. Optimal eavesdropping in quantum cryptography with six states [J].Phys. Rev. Left.,1998,32(14):3018-3021.
[10] Ekert A. Quantum cryptography based on Bell'S theorem [J].Phys. Rev. Lett.,1991,67: 661-663.
[11] Bennett C H,Bessette F,Brassard G,et al. Experimental quantum cryptography [J].Journal of Cryptology,1992,5(1): 3-28.
[12] Marand C. Townsend PD Quantum key distribution over distance as long as 30 km [J].Opt. Lett.,1995,20: 169.
[13] Hiskett P A,et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD based quantumcryptography receiver operating at 1.55 μm [J].J. Mod. Opt.,2001,48: 1957.
[14] Kosaka H,et al. Single photon interference experiment over 100 km for quantum cryptography system using balancedgated mode photon detector [J].Elec. Lett.,2003,39: 1199.
[18] Rukhin A,et al. A statistical test suite for random and pseudo-random number generators for cryptographic applications [OL],NIST(2001),http://csrc.nist.gov/rng/