Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N.; Monyk, C.; Painchault, P.; Peev, M.; Poppe, A.; Pornin, T.; Rarity, J.; Renner, R.; Ribordy, G.; Riguidel, M.; Salvail, L.; Shields, A.; Weinfurter, H.; Zeilinger, A. Using quantum key distribution for cryptographic purposes: a survey. (English) Zbl 1306.81029 Theor. Comput. Sci. 560, Part 1, 62-81 (2014). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{R. Alléaume} et al., Theor. Comput. Sci. 560, Part 1, 62--81 (2014; Zbl 1306.81029) Full Text: DOI
Peev, M.; Pacher, C.; Lorünser, T.; Nölle, M.; Poppe, A.; Maurhart, O.; Suda, M.; Fedrizzi, A.; Ursin, R.; Zeilinger, A. Response to “Vulnerability of ‘A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography”’. (English) Zbl 1182.94045 Int. J. Quantum Inf. 7, No. 7, 1401-1407 (2009). MSC: 94A60 94A62 81P94 PDFBibTeX XMLCite \textit{M. Peev} et al., Int. J. Quantum Inf. 7, No. 7, 1401--1407 (2009; Zbl 1182.94045) Full Text: DOI
Peev, M.; Nölle, M.; Maurhardt, O.; Lorünser, T.; Suda, M.; Poppe, A.; Ursin, R.; Fedrizzi, A.; Zeilinger, A. A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography. (English) Zbl 1066.94015 Int. J. Quantum Inf. 3, No. 1, 225-231 (2005). MSC: 94A60 81P68 94A62 PDFBibTeX XMLCite \textit{M. Peev} et al., Int. J. Quantum Inf. 3, No. 1, 225--231 (2005; Zbl 1066.94015) Full Text: DOI arXiv