[1] S. Barnett, “Quantum information,” Oxford Univ. Press, New York, 2009.##
[2] S. A. Oskoueian and N. Bagheri, “Differential cryptanalysis of round-reduced SIMON32 and SIMON48 and SIMON64,” Journal of Electronical & Cyber Defence, vol. 5, pp. 1-8, 2017 (In Persian).##
[3] J. Pu and S. Chao, “Spectral anomalies in Young's double-slit interference experiment,” Optics Express, vol. 12, pp. 5131-5139, 2004.##
[4] E. Diamanti, H. K. Lo, B. Qi, and Z. Yuan, “Practical challenges in quantum key distribution,” npj Quantum Information, vol. 2, 16025, 2016.##
[5] L. O. Mailloux, M. R. Grimaila, D. D. Hodson, R. Engle, C. McLaughlin, and G. Baumgartner, “Modeling, simulation, and performance analysis of decoy state enabled quantum key distribution systems,” Applied Sciences, vol. 7, 212, 2017.##
[6] Z. Zhang, Q. Zhao, M. Razavi, and X. Ma, “Improved key-rate bounds for practical decoy-state quantum-key-distribution systems,” Physical Review A, vol. 95, 012333, 2017.##
[7] D. Bacco, M. Canale, N. Laurenti, G. Vallone, and P. Villoresi, “Experimental quantum key distribution with finite-key security analysis for noisy channels,” Nature Communications, vol. 4, 2363, 2013.##
[8] F. L. Pedrotti, L. M. Pedrotti, and L. S. Pedrotti, “Introduction to optics,” Pearson Publishing, 3rd Edition, Harlow, 2014.##
[9] W. Rueckner and J. Peidle, “Young's double-slit experiment with single photons and quantum eraser,” American Journal of Physics, vol. 81, pp. 951-958, 2013.##
[10] A. Gaeeni, “An introduction to the probability theory,” Imam Hossein Univ. Press, Tehran, 2006 (In Persian).##
[11] M. Born, E. Wolf, A. B. Bhatia, P. C. Clemmow, D. Gabor, A. R. Stokes, A. M. Taylor, P. A. Wayman, and W. L. Wilcock, “Principles of optics, electromagnetic theory of propagation, interference and diffraction of light,” Cambridge Univ. Press, 7th Edition, 1999.##
[12] P. J. Coles, E. M. Metodiev, and N. Lütkenhaus, “Numerical approach for unstructured quantum key distribution,” Nature Communications, vol. 7, 11712, 2016.##