1. Alagic G. Alperin‐Sheriff J. Apon D.et al. (2019).NISTIR 8240 Status Report on the First Round of the NIST Post‐Quantum Cryptography Standardization Process. National Institute of Standards and Technology NIST. https://doi.org/10.6028/NIST.IR.8240.
2. Barker E.andDang Q.(2015).NIST special publication 800‐57 Part 3 revision 1: key management. Part 3: application‐specific key management guidance. http://dx.doi.org/10.6028/NIST.SP.800‐57pt3r1.
3. On the einstein podolsky rosen paradox;Bell J.S.;Physics Physique Fizika,1964
4. Bennett C.H.andBrassard G.(1984).Quantum cryptography: public key distribution and coin tossing.International Conference on Computers Systems & Signal Processing.http://researcher.watson.ibm.com/researcher/files/us‐bennetc/BB84highest.pdf(accessed 18 September 2020).
5. Post-Quantum Cryptography