[
[1] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, Nov. 1994, pp. 124–134. https://doi.org/10.1109/SFCS.1994.36570010.1109/SFCS.1994.365700
]Search in Google Scholar
[
[2] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. https://doi.org/10.1137/S009753979529317210.1137/S0097539795293172
]Search in Google Scholar
[
[3] J. L. Park, “The concept of transition in quantum mechanics,” Found Phys, vol. 1, pp. 23–33, Mar. 1970. https://doi.org/10.1007/BF0070865210.1007/BF00708652
]Search in Google Scholar
[
[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.
]Search in Google Scholar
[
[5] C. H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical review letters, vol. 68, pp. 3121–3124, 1992, https://10.1103/physrevlett.68.312110.1103/PhysRevLett.68.312110045619
]Search in Google Scholar
[
[6] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical review letters, vol. 67, pp. 661–663, 1991. https://10.1103/PhysRevLett.67.66110.1103/PhysRevLett.67.66110044956
]Search in Google Scholar
[
[7] S. Mishra et al., “BBM92 quantum key distribution over a free space dusty channel of 200 meters”, Journal of Optics, vol. 24, no. 7, pp. 074002, 2022. https://doi.org/10.48550/arXiv.2112.1196110.1088/2040-8986/ac6f0b
]Search in Google Scholar
[
[8] A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and S. Saharudin, “An efficient modeling and simulation of quantum key distribution protocols using OptiSystem,” in 2012 IEEE Symposium on Industrial Electronics and Applications, Bandung, Indonesia, Sep. 2012, pp. 84–89. https://doi.org/10.1109/ISIEA.2012.649667710.1109/ISIEA.2012.6496677
]Search in Google Scholar
[
[9] B. Archana and S. Krithika, “Implementation of BB84 quantum key distribution using OptSim,” in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 457–460. https://doi.org/10.1109/ECS.2015.712494610.1109/ECS.2015.7124946
]Search in Google Scholar
[
[10] O. Grote, A. Ahrens, and C. Benavente-Peces, “Modelling and simulation of quantum key distribution using OptSim,” in 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, Oct. 2021, pp. 160–164. https://doi.org/10.1109/MTTW53539.2021.960716510.1109/MTTW53539.2021.9607165
]Search in Google Scholar
[
[11] Synopsys. OptSim, Software for Design and Simulation of Optical communication. [Online]. Available: https://www.synopsys.com/photonic-solutions/optsim/single-modenetwork.html. [Accessed on: Dec. 13, 2021].
]Search in Google Scholar
[
[12] S. Pirandola et al., “Advances in quantum cryptography”, Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020. https://doi.org/10.1364/AOP.36150210.1364/AOP.361502
]Search in Google Scholar
[
[13] S. Flammia and J. Wallman, “Efficient estimation of Pauli channels”, ACM Transactions on Quantum Computing, vol.1, no. 1, Art. no. 3, Dec. 2020. https://doi.org/10.1145/340803910.1145/3408039
]Search in Google Scholar
[
[14] X. Wang, “Perfect random number generator is unnecessary for secure quantum key distribution”, 2004, arXiv:quant-ph/0405182v2.
]Search in Google Scholar
[
[15] A. Boaron et al., “Secure quantum key distribution over 421 km of optical fiber”, Physical Review Letters, vol. 121, Art. no. 190502, Nov. 2018. https://doi.org/10.1103/PhysRevLett.121.19050210.1103/PhysRevLett.121.19050230468607
]Search in Google Scholar