[5] Wu Xiaogang, Hu Hanping, Zhang Baoliang. Parameter estimation only from the symbolic sequences generated by chaos system [J]. Chaos, Solitons and Fractals, 2004, 22(2): 359-366.
[6] Zeng Guihua, Zhang Weiping. Identity verification in quantum cryptography [J]. Phys. Rev. A, 2000, 61(2): 022303/1-5.
[8] Zhou Nanrun, Zeng Guihua, Zeng Wenjie, et al. Cross-center quantum identity authentication scheme based on teleportation and entanglement swapping [J]. Optics Communications, 2005, 254(4-6): 380-388.
[12] Cao Zhengwen, Dai Zhaoyang, Xu Ping, et al. A study on quantum key expansion method based on chaos [C]. The 2nd International Conference on Information Science and Engineering (ICISE2010), 2010, 4320-4323 (in Chinese).
[13] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing [C]. Proc. of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, 175-179.