[1] Bennett C, Brassard G. Quantum cryptography: Public-key distribution and coin tossing.In proceedings of the IEEE International Conference on Computers,Systems and Signal Processing, Bangalore,India, New York:IEEE , 1984 .175~179
[2] Bennett C.Quantum cryptography using any two nonorthogonal states.Phys Rev Lett,1992,68(21):3121~3124
[3] Ekert A.Quantum cryptography based on Bell's theorem. Phys Rev Lett,1991,67(6):661~663
[4] Ekert A, Huttner B, Peres A,et al. Eavesddropping on quantum-cryptographical systems.Phys Rev(A),1994,50(2):1047~1056
[5] Lütkenhaus N.Security against eavesdropping in quantum cryptography. Phys Rev(A), 1996,54(1):97~111
[6] Fuchs A, Gisin N, Peres A,et al.Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy.Phys Rev(A),1997,56(2):1163~1172
[7] Félix s, Gisin N,Stefanov A,et al.Faint laser quantum key distribution:eavesdropping exploiting multiphoton pulses.J Mod Optics,2001,48(13):2009~2021
[10] Bennett C, Brassard G,Smolin J,et al. Experimental quantum cryptography.J Crypto,1992,5(1):3~28