Wolfram Alpha. Totient function., 2011.
M. Ardehali. A simple quantum oblivious transfer protocol. 1995.
Charles H. Bennett. Quantum cryptography: Uncertainty in the service of privacy. Junho de 1992.
Daniel J. Bernstein. Introduction to post-quantum cryptography. In Post-Quantum Cryptography. 2009.
Manuel Blum. Coin flipping by telephone. Novembro de 1981.
D. Bohm. A suggested interpretation of the quantum theory in terms of "hidden" variables. i. Phys. Rev., 85(2):166–179, 1952.
C. Dods, N. Smart, and M. Stam. Hash based digital signature schemes. In Cryptography and Coding. Springer Berlin / Heidelberg, 2005.
C. Dods, N. Smart, and M. Stam. Hash based digital signature schemes. In Cryptography and Coding. Springer Berlin / Heidelberg, 2005.
O. M. B. Duarte. Redes de computadores., 2011.
M. D. Towler; N. J. Russell e A. Valentini. Timescales for dynamical relaxation to the Born rule. 2011.
R. J. Hughes e C. P. Williams. Quantum computing: the final frontier? IEEE Intelligent Systems, 15, Setembro/Outubro de 2000.
N. Ferguson; J. Kelsey; S. Lucks; B. Schneier; M. Stay; D. Wagner e D. Whiting. Improved cryptanalysis of rijndael. In Fast Software Encryption, pages 136–141. Springer Berlin / Heidelberg, 2001.
Charles H. Bennett e Gilles Brassard. Quantum cryptography: Public key distribution and coin tossing. International Conference on Computers, Systems & Signal Processing, Dezembro de 1984.
Elwyn R. Berlekamp; Robert J. McEliece e Henk C. A. Van Tilborg. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory IT, 24, 1978.
A. Lenstra; H. Lenstra; M. Manasse e J. Pollard. The number field sieve. In The development of the number field sieve, volume 1554, pages 11–42. Springer Berlin / Heidelberg, 1993.
Charles H. Bennett; François Bessette; Gilles Brassard; Louis Salvail e John Smolin. Experimental quantum cryptography. Setembro de 1991.
Stefan Wolf e Jörg Wullschleger. Oblivious transfer and quantum non-locality. 2005.
Daniel J. Bernstein e Tanja Lange (editores). ebacs: Ecrypt benchmarking of cryptographic systems., acessado em Junho de 2011.
Nicolas Gisin et al. et al. Quantum cryptography. Reviews of Modern Physics, 74, Janeiro de 2002.
FreeSoft.Org. Hash functions., 2011.
IBM. Ibm-led team demonstrates most-advanced quantum computer., 2011.
IBM. Ibm’s test-tube quantum computer makes history., 2011.
idQuantique., 2011.
C. Kiefer. On the interpretation of quantum theory - from copenhagen to the present day, 2002.
Leslie Lamport. Constructing digital signatures from a one way function., acessado em Junho de 2011.
MagiQ., 2007.
J. Markoff. Quantum computing reaches for true power. The New York Times, 8 de Novembro de 2010.
R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. Janeiro e Fevereiro de 1978.
National Institute of Standards and Technology. Secure Hash Standard, 1995.
National Institute of Standards and Technology. Data Encryption Standard (DES), 1999.
National Institute of Standards and Technology. Specification for the Advanced Encryption Standard (AES), 2001.
O’Relly. Common cryptographic algorithms., 2011.
Raphael Overbeck and Nicolas Sendrier. Code-based cryptography. In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2009.
QinetiQ., 2011.
Adi Shamir; Ronald L. Rivest and Leonard M. Adleman. Mental poker. Mathematical Gardner, p. 38, 1981.
R. Rivest. The md5 message-digest algorithm. 1992.
B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, Cambridge Security Workshop Proceedings, 1993.
B. Schneier. Applied Cryptography, chapter 13.9. John Wiley & Son, 1996.
R. L. Rivest; A. Shamir and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21:120–126, Fevereiro de 1978.
P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Scientific Computing, 26, 1997.
G. Stix. Best-kept secrets. Scientific American, 292, Janeiro de 2005.
D-Wave Systems., 2011.
Yale University. Scientists create first electronic quantum processor., 2011.
Wikipedia. Cryptography., 2011.