[1] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C] //Proc. of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York):1984, 175.
[2] Barnett S M, Phoeix S J D. Bell's inequality and rejected-data protocols for quantum cryptography [J]. J. Mod.Opt., 1993, 40: 1443.
[3] Barnett S M, et al. Eavesdropping stategies and rejected data protocols in quantum cryptography [J]. J. Mod.Opt., 1993, 40: 2501.
[4] Ekert A K, Palma G M. Quantum cryptography with interferometric quantum entanglement [J]. J. Mod. Opt.,1994, 41: 2413.
[6] Bennett C H.,et al. Experimental quantum cryptography [J]. J. Crypto., 1992, 5: 3.
[7] Philip A Hiskett, et al. Eighty kilometer transmission experiment using an InGaAs/InP SPAD based quantum cryptography receiver operating at 1.55 μm [J]. J. Mod. Opt., 2001, 48: 1957.
[8] H. Kosaka, et al. Single-photon interference experiment over 100km for quantum cryptography system using balanced gated-mode photon detector [J]. Elec. Lett., 2003, 39: 1199.
[10] Rukhin A, et al. A statistical test suite for random and pseudo-random number generators for cryptographic applications [R]. NIST, 2001.