LINK  N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys., vol.74, pp.145-195, 2002.
LINK  V. Scarani, H. Bechmann-Pasquinucci, N. J.Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,”Rev. Mod. Phys., vol.81, pp.1301-1350, 2009.
LINK  G. S. Vernam, “Cipher printing telegraph systems for secret wire and radiotelegraphic communications,” J. Amer. Inst. Elec. Eng., vol.45, pp.109-115, 1926.
LINK  C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and cointossing,” in Proc. IEEE Int. Conference on Computers, Systems and Signal Processing,Bangalore, India, IEEE Press, New York, pp.175-179, 1984.
LINK  H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,”Eur. Phys. J. D, vol.41, no.3, pp.599-627, 2007.
LINK  D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distributionwith imperfect devices,” Quantum Inf. Comput., vol.4, pp.325-360, 2004.
LINK  W.-Y. Hwang, “Quantum key distribution with high loss: toward global securecommunication,”Phys. Rev. Lett., vol.91, 057901, 2003.
LINK  H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,”Phys. Rev. Lett., vol.94, 230504, 2005.
LINK  X.-B. Wang, “Beating the photon-number-splitting attack in practical quantumcryptography,” Phys. Rev. Lett., vol.94, 230503, 2005.
LINK  J. G. Rarity, P. C. M. Owens, and P. R. Tapster, “Quantum random-number generation and key sharing,”J. Mod. Opt., vol.41, no.12, pp.2435-2444, 1994.
LINK  W. Mauerer and C. Silberhorn, “Quantum key distribution with passive decoy state selection,”Phys. Rev. A, vol.75, 050305(R), 2007.
LINK  Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto, “Simple and efficient quantum key distribution withparametric down-conversion,” Phys. Rev.Lett., vol.99, 180503, 2007.
LINK  M. Curty, T. Moroder, X. Ma, and N. Lütkenhaus,“Non-Poissonian statistics from Poissonian lightsources with application to passive decoy statequantum key distribution,” Opt. Lett., vol.34, pp.3238-3240, 2009.
LINK  Y. Adachi, T. Yamamoto, M. Koashi, and N. Imoto,“Boosting up quantum key distribution by learning statistics of practical single-photon sources,”New J. Phys., vol.11, 113033, 2009.
LINK  M. Curty, X. Ma, B. Qi, and T. Moroder, “Passive decoy-state quantum key distribution with practical light sources,”Phys. Rev. A, vol.81, 022310, 2010.
LINK  W. Tittel, J. Brendel, H. Zbinden, and N. Gisin,“Quantum cryptography usingentangled photons in energy-time Bell states,”Phys. Rev. Lett., vol.84, pp.4737-4740, 2000.
LINK  M. Curty, X. Ma, H.-K-Lo, and N. Lütkenhaus, “Passive sources for the Bennett-Brassard 1984 quantumkey distribution protocol with practical signals,” preprint arXiv:1009.3830.
LINK  K. Peterman, Laser Diode Modulation and Noise, Kluwer Academic Publishers, New York, 1991.ISBN: 978-0792312048.
LINK  M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W. Mitchell,and V. Pruneri, “100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm,”J. of Lightwave Tech., vol.28, no. 17, pp.2572-2578, 2010.
LINK  T. Moroder, M. Curty, and N. Lütkenhaus, “One-way quantum key distribution: simple upper bound on the secret key rate,”Phys. Rev. A, vol.74, 052301, 2006.
LINK  N. Lütkenhaus, “Estimates for practical quantum cryptography,” Phys. Rev. A, vol.59, pp.3301-3319, 1999.
LINK  N. J. Beaudry, T. Moroder, and N. Lütkenhaus,“Squashing models for optical measurements in quantum communication,”Phys. Rev.Lett., vol.101, 093601, 2008.
LINK  H.-K. Lo, H. F. C. Chau, and M. Ardehali,“Efficient quantum key distribution scheme and a proof of Its unconditional security,”J. Cryptology, vol.18, pp.133-165, 2005.