The two parties may detect such an eavesdropper by the disturbance of the states. Subsequently the two parties share a random secure key from which they may encode their data using a one-time pad ...
The most notable are the BB84 protocol, developed in 1984, and Shor's algorithm, developed in 1994, both of which use entanglement to outperform classical algorithms on particular tasks.