[1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C], 175-179(1984).
[2] Brassard G, Lütkenhaus N, Mor T et al. Limitations on practical quantum cryptography[J]. Physical Review Letters, 85, 1330-1333(2000).
[3] Xu F H, Ma X F, Zhang Q et al. Secure quantum key distribution with realistic devices[J]. Reviews of Modern Physics, 92, 025002(2020).
[4] Lydersen L, Wiechers C, Wittmann C et al. Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 4, 686-689(2010).
[5] Wiechers C, Lydersen L, Wittmann C et al. After-gate attack on a quantum cryptosystem[J]. New Journal of Physics, 13, 013043(2011).
[6] Weier H N, Krauss H, Rau M et al. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors[J]. New Journal of Physics, 13, 073024(2011).
[7] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution[J]. Physical Review A, 61, 052304(2000).
[8] Lydersen L, Jain N, Wittmann C et al. Superlinear threshold detectors in quantum cryptography[J]. Physical Review A, 84, 032320(2011).
[9] Wu Z H, Huang A Q, Chen H et al. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination[J]. Optics Express, 28, 25574-25590(2020).
[10] Calandri N, Sanzaro M, Tosi A et al. Charge persistence in InGaAs/InP single-photon avalanche diodes[J]. IEEE Journal of Quantum Electronics, 52, 1-7(2016).