[1] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179, 1984.##
[2] S. Wiesner, “Conjugate coding,” ACM SIGACT News, vol. 15, no. 1, pp. 78-88, 1983.##
[3] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. of Mod. Phys., vol. 74, no. 1, pp. 145-195, 2002.##
[4] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett., vol. 67, no. 6, pp. 661-663, 1991.##
[5] C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett., vol. 68, no. 21, pp. 3121-3124, 1992.##
[6] L. Goldenberg and L. Vaidman, “Quantum cryptography based on orthogonal states,” Phys. Rev. Lett., vol. 75, no. 7, pp. 1239-1243, 1995.##
[7] D. Bruß, “Optimal eavesdropping in quantum cryptography with six states,” Phys. Rev. Lett., vol. 81, no. 14, pp. 3018-3021, 1998.##
[8] H. Bechmann-Pasquinnuci and N. Gisin, “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography,” Phys. Rev. A, vol. 59, no. 6, pp. 4238-4248, 1999.##
[9] M. Ardehali, H. F. Chau, and H. -K. Lo, “Efficient quantum key distribution,” arXiv:quant-ph/9803007v4, 1999.##
[10] V. Scarani, A. Acin, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett., vol. 92, no. 5, p. 057901, 2004.##
[11] M. Lucamarini and S. Mancini, “Secure deterministic communication without entanglement,” Phys. Rev. Lett., vol. 94, no. 14, p. 140501, 2005.##
[12] S. V. Kartalopoulos, “Link-layer vulnerabilities of quantum cryptography,” Proceedings of the SPIE International Congress on Optics and Optoelectronics, pp. 111-118, 2005.##
[13] S. V. Kartalopoulos, “K08: A generalized BB84/B92 protocol in quantum cryptography,” Secur. Comm. Networks, vol. 2, pp. 686-693, 2008.##
[14] E. E. Hernandez Serna, “Quantum key distribution protocol with private-public key,” arXiv:0908.2146v4 [quant-ph], 2012.##
[15] E. E. Hernandez Serna, “Quantum key distribution from a random seed,” arXiv:1311.1582 [quant-ph], 2013.##
[16] S. M. Hosseini, S. Janbaz, M. Davoudi Darareh, and A. Zaghian, “A new approach for estimating the rate of emission in quantum bit exchange systems using binomial distribution,” Journal of Electronic & Cyber Defense, vol. 7, no. 1, pp. 105-112, 2019. (In Persian)##