Bennett, C. H.; Brassard, G. (1984). "Quantum cryptography: Public key distribution and coin tossing". Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India. Vol. 1. New York: IEEE. pp. 175–179. Reprinted as Bennett, C. H.; Brassard, G. (4 December 2014). "Quantum cryptography: Public key distribution and coin tossing". Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. 560 (1): 7–11. arXiv:2003.06557. doi:10.1016/j.tcs.2014.05.025.
Mayers, Dominic; Yao, Andrew C.-C. (1998). Quantum Cryptography with Imperfect Apparatus. IEEE Symposium on Foundations of Computer Science (FOCS). arXiv:quant-ph/9809039. Bibcode:1998quant.ph..9039M.
Colbeck, Roger (December 2006). "Chapter 5". Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis). University of Cambridge. arXiv:0911.3814.
Nair, Ranjith; et al. (13 September 2005). "Reply to:'Reply to:"Comment on:'How much security does Y-00 protocol provide us?'"'". arXiv:quant-ph/0509092.
Scarani, Valerio; Kurtsiefer, Christian (4 December 2014). "The black paper of quantum cryptography: Real implementation problems". Theoretical Computer Science. 560: 27–32. arXiv:0906.4547. doi:10.1016/j.tcs.2014.09.015. S2CID44504715.
Bennett, C. H.; Brassard, G. (1984). "Quantum cryptography: Public key distribution and coin tossing". Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India. Vol. 1. New York: IEEE. pp. 175–179. Reprinted as Bennett, C. H.; Brassard, G. (4 December 2014). "Quantum cryptography: Public key distribution and coin tossing". Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. 560 (1): 7–11. arXiv:2003.06557. doi:10.1016/j.tcs.2014.05.025.
E. C. G., Sudarshan (1 April 1963). "Equivalence of Semiclassical and Quantum Mechanical Descriptions of Statistical Light Beams". Physical Review Letters. 10 (7): 277–279. Bibcode:1963PhRvL..10..277S. doi:10.1103/PhysRevLett.10.277.
Yuen, Horace P.; et al. (10 October 2005). "Comment on:'How much security does Y-00 protocol provide us?'[Phys. Lett. A 327 (2004) 28]". Physics Letters A. 346 (1–3): 1–6. Bibcode:2005PhLA..346....1Y. doi:10.1016/j.physleta.2005.08.022.
Nishioka, Tsuyoshi; et al. (10 October 2005). "Reply to:"Comment on:'How much security does Y-00 protocol provide us?'" [Phys. Lett. A 346 (2005) 1]". Physics Letters A. 346 (1–3). Bibcode:2005PhLA..346....1Y. doi:10.1016/j.physleta.2005.08.022.
Mihaljević, Miodrag J. (24 May 2007). "Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach". Physical Review A. 75 (5) 052334. Bibcode:2007PhRvA..75e2334M. doi:10.1103/PhysRevA.75.052334.
Tregubov, P. A.; Trushechkin, A. S. (21 November 2020). "Quantum Stream Ciphers: Impossibility of Unconditionally Strong Algorithms". Journal of Mathematical Sciences. 252: 90–103. doi:10.1007/s10958-020-05144-x. S2CID254745640.
Scarani, Valerio; Kurtsiefer, Christian (4 December 2014). "The black paper of quantum cryptography: Real implementation problems". Theoretical Computer Science. 560: 27–32. arXiv:0906.4547. doi:10.1016/j.tcs.2014.09.015. S2CID44504715.
E. C. G., Sudarshan (1 April 1963). "Equivalence of Semiclassical and Quantum Mechanical Descriptions of Statistical Light Beams". Physical Review Letters. 10 (7): 277–279. Bibcode:1963PhRvL..10..277S. doi:10.1103/PhysRevLett.10.277.
Yuen, Horace P.; et al. (10 October 2005). "Comment on:'How much security does Y-00 protocol provide us?'[Phys. Lett. A 327 (2004) 28]". Physics Letters A. 346 (1–3): 1–6. Bibcode:2005PhLA..346....1Y. doi:10.1016/j.physleta.2005.08.022.
Nishioka, Tsuyoshi; et al. (10 October 2005). "Reply to:"Comment on:'How much security does Y-00 protocol provide us?'" [Phys. Lett. A 346 (2005) 1]". Physics Letters A. 346 (1–3). Bibcode:2005PhLA..346....1Y. doi:10.1016/j.physleta.2005.08.022.
Mihaljević, Miodrag J. (24 May 2007). "Generic framework for the secure Yuen 2000 quantum-encryption protocol employing the wire-tap channel approach". Physical Review A. 75 (5) 052334. Bibcode:2007PhRvA..75e2334M. doi:10.1103/PhysRevA.75.052334.
Tregubov, P. A.; Trushechkin, A. S. (21 November 2020). "Quantum Stream Ciphers: Impossibility of Unconditionally Strong Algorithms". Journal of Mathematical Sciences. 252: 90–103. doi:10.1007/s10958-020-05144-x. S2CID254745640.
Scarani, Valerio; Kurtsiefer, Christian (4 December 2014). "The black paper of quantum cryptography: Real implementation problems". Theoretical Computer Science. 560: 27–32. arXiv:0906.4547. doi:10.1016/j.tcs.2014.09.015. S2CID44504715.