Referencias

Bell, J. S. 1964. “On the Einstein Podolsky Rosen Paradox.” Physics Physique Fizika 1 (November): 195–200. https://doi.org/10.1103/PhysicsPhysiqueFizika.1.195.
Bennett, Charles H., and Gilles Brassard. 1984. “Quantum Cryptography: Public Key Distribution and Coin Tossing.” In Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–79. Bangalore, India. https://doi.org/10.48550/arXiv.2003.06557.
Bennett, Charles H., Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K. Wootters. 1993. “Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels.” Phys. Rev. Lett. 70 (March): 1895–99. https://doi.org/10.1103/PhysRevLett.70.1895.
Bennett, Charles H., and Stephen J. Wiesner. 1992. “Communication via One- and Two-Particle Operators on Einstein-Podolsky-Rosen States.” Phys. Rev. Lett. 69 (November): 2881–84. https://doi.org/10.1103/PhysRevLett.69.2881.
Clauser, John F., Michael A. Horne, Abner Shimony, and Richard A. Holt. 1969. “Proposed Experiment to Test Local Hidden-Variable Theories.” Phys. Rev. Lett. 23 (October): 880–84. https://doi.org/10.1103/PhysRevLett.23.880.
Deutsch, David. 1985. “Quantum Theory, the Church–Turing Principle and the Universal Quantum Computer.” Proc. R. Soc. Lond. A 400: 97–117. https://doi.org/10.1098/rspa.1985.0070.
Deutsch, David, and Richard Jozsa. 1992. “Rapid Solution of Problems by Quantum Computation.” Proc. R. Soc. Lond. A 439: 553–58. https://doi.org/10.1098/rspa.1992.0167.
Dieks, D. 1982. “Communication by EPR Devices.” Physics Letters A 92: 271–72. https://doi.org/10.1016/0375-9601(82)90084-6.
Einstein, A. 1905. “Über Einen Die Erzeugung Und Verwandlung Des Lichtes Betreffenden Heuristischen Gesichtspunkt.” Annalen Der Physik 322: 132–48. https://doi.org/10.1002/andp.19053220607.
Einstein, A., B. Podolsky, and N. Rosen. 1935. “Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?” Phys. Rev. 47 (May): 777–80. https://doi.org/10.1103/PhysRev.47.777.
Feynman, Richard Phillips. 1982. “Simulating Physics with Computers.” International Journal of Theoretical Physics 21: 467–88. https://doi.org/10.1007/BF02650179.
Grover, L. K. 1996. “A Fast Quantum Mechanical Algorithm for Database Search.” In Proceedings of 28th Annual ACM Symposium on the Theory of Computing, 212–19. Philadelphia, Penn. USA. https://doi.org/10.1145/237814.237866.
Herbert, Nick. 1982. “FLASH—a Superluminal Communicator Based Upon a New Kind of Quantum Measurement.” Foundations of Physics 12 (December): 1171–79. https://doi.org/10.1007/BF00729622.
Kak, Subhash. 2006. “A Three-Stage Quantum Cryptography Protocol.” Foundations of Physics Letters 19 (3): 293–96. https://doi.org/10.1007/s10702-006-0520-9.
Peres, A. 2003. “How the No-Cloning Theorem Got Its Name.” Fortschritte Der Physik 51: 458–61. https://doi.org/10.1002/prop.200310062.
Planck, Max. 1901. “Über Das Gesetz Der Energieverteilung Im Normalspectrum.” Annalen Der Physik 309: 553–63. https://doi.org/10.1002/andp.19013090310.
Shannon, C. E. 1949. “Communication Theory of Secrecy Systems.” Bell System Technical Journal 28 (4): 656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
Shor, Peter W. 1994. “Algorithms for Quantum Computation: Discrete Logarithms and Factoring.” In Proceedings 35th Annual Symposium on Foundations of Computer Science, 124–34. https://doi.org/10.1109/SFCS.1994.365700.
Wootters, William K., and Wojciech H. Zurek. 1982. “A Single Quantum Cannot Be Cloned.” Nature 299 (October): 802–3. https://doi.org/10.1038/299802a0.