A new research article outlines another aspect of Quantum Cryptography
In "No Signaling and quantum key distribution", a new paper published in Physical Review Letters 95 (010503 – 2005), Barrett, Hardy and Kent give the first example of a way of implementing quantum cryptography which is provably secure - even if quantum theory is incorrect, so long as a successor theory shares with quantum theory the features which make faster-than-light signaling impossible.
The scheme can be implemented by two parties (Alice and Bob) who know quantum theory but know nothing about the precise form of any successor theory, and is secure against a "post-quantum" eavesdropper, Eve, even if she knows the successor theory and has arbitrary post-quantum technology available to her.
Related link: Perimeter Institute for Theoretical Physics
Explore further: Scientists fabricate defect-free graphene, set record reversible capacity for Co3O4 anode in Li-ion batteries