[1] A. Ekert, “Quantum Cryptography Based on Bell’s Theorem,” Physical Review Letters, Vol. 67, 1991, pp. 661-663. http://dx.doi.org/10.1103/PhysRevLett.67.661
[2] D. Enzer, P. Hadley, R. Gughes, C. Peterson and P. Kwiat, “Entangled-Photon Six-State Quantum Cryptography,” New Journal of Physics, Vol. 4, 2002, pp. 45.1-45.8.
[3] J. Pan, C. Simon, C. Brukner and A. Zeilinger, “Entanglement Purification for Quantum Communication,” Nature, Vol. 410, 2001, pp. 1067-1070.
http://dx.doi.org/10.1038/35074041
[4] A. Ekert, J. Rarity, P. Tapster and G. M. Palma, “Practical Quantum Cryptography Based on Two-Photon Interferometry,” Physical Review Letters, Vol. 69, 1992, pp. 1293-1295.
http://dx.doi.org/10.1103/PhysRevLett.69.1293
[5] M. Lindenthal, “Long-Distance Free-Space Quantum Communication with Entangled Photons,” Ph.D. Thesis, Vienna University, Vienna, 2006.
[6] D. C. Burnham and D. L. Weinberg, “Observation of Simultaneity in Parametric Production of Optical Photon Pairs,” Physical Review Letters, Vol. 25, 1970, pp. 84-87.
http://dx.doi.org/10.1103/PhysRevLett.25.84
[7] Austrain Institute of Technology, AIT QKD Software Project Documentation, 2010.
[8] C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 10-12 December 1984, pp. 175-179.
[9] J. S. Bell, “On the Einstein-Podolsky-Rosen Paradox,” Physics, Vol. 1, No. 3, 1964, pp. 195-200.
[10] M. Curty, M. Lewenstein and N. Lutkenhaus, “Entanglement as Precondition for Secure Quantum Key Distribution,” Physical Review Letters, Vol. 92, 2004, Article ID: 217903.
http://dx.doi.org/10.1103/PhysRevLett.92.217903
[11] A. Garg and N. D. Mermin, “Detector Inefficiencies in the Einstein-Podolsky-Rosen Experiment,” Physical Review D, Vol. 35, No. 12, 1987, pp. 3831-3835.
http://dx.doi.org/10.1103/PhysRevD.35.3831