[1]
|
A. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Physical Review Letters, Vol. 67, 1991, pp. 661-663. http://dx.doi.org/10.1103/PhysRevLett.67.661
|
[2]
|
D. Enzer, P. Hadley, R. Gughes, C. Peterson and P. Kwiat, “Entangled-Photon Six-State Quantum Cryptography,” New Journal of Physics, Vol. 4, 2002, pp. 45.1-45.8.
|
[3]
|
J. Pan, C. Simon, C. Brukner and A. Zeilinger, “Entanglement Purification for Quantum Communication,” Nature, Vol. 410, 2001, pp. 1067-1070. http://dx.doi.org/10.1038/35074041
|
[4]
|
A. Ekert, J. Rarity, P. Tapster and G. M. Palma, “Practical Quantum Cryptography Based on Two-Photon Interferometry,” Physical Review Letters, Vol. 69, 1992, pp. 1293-1295. http://dx.doi.org/10.1103/PhysRevLett.69.1293
|
[5]
|
M. Lindenthal, “Long-Distance Free-Space Quantum Communication with Entangled Photons,” Ph.D. Thesis, Vienna University, Vienna, 2006.
|
[6]
|
D. C. Burnham and D. L. Weinberg, “Observation of Simultaneity in Parametric Production of Optical Photon Pairs,” Physical Review Letters, Vol. 25, 1970, pp. 84-87. http://dx.doi.org/10.1103/PhysRevLett.25.84
|
[7]
|
Austrain Institute of Technology, AIT QKD Software Project Documentation, 2010.
|
[8]
|
C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 10-12 December 1984, pp. 175-179.
|
[9]
|
J. S. Bell, “On the Einstein-Podolsky-Rosen Paradox,” Physics, Vol. 1, No. 3, 1964, pp. 195-200.
|
[10]
|
M. Curty, M. Lewenstein and N. Lutkenhaus, “Entanglement as Precondition for Secure Quantum Key Distribution,” Physical Review Letters, Vol. 92, 2004, Article ID: 217903. http://dx.doi.org/10.1103/PhysRevLett.92.217903
|
[11]
|
A. Garg and N. D. Mermin, “Detector Inefficiencies in the Einstein-Podolsky-Rosen Experiment,” Physical Review D, Vol. 35, No. 12, 1987, pp. 3831-3835. http://dx.doi.org/10.1103/PhysRevD.35.3831
|