V. Scarani, H. Bechmann-pasquinucci, N. J. Cerf, M. Dusek, N. Lütkenhaus et al., The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009.
DOI : 10.1103/RevModPhys.81.1301

P. W. Shor and J. Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, vol.85, issue.2, p.441, 2000.
DOI : 10.1103/PhysRevLett.85.441

B. Kraus, N. Gisin, and R. Renner, Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, p.80501, 2005.
DOI : 10.1103/PhysRevLett.95.080501

R. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005.
DOI : 10.1103/PhysRevA.72.012332

R. Renner and P. D. Zurich, e-print arXiv:quant-ph, 2005.

R. Renner and J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009.
DOI : 10.1103/PhysRevLett.102.110504

A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio et al., Device-Independent Security of Quantum Cryptography against Collective Attacks, Physical Review Letters, vol.98, issue.23, p.230501, 2007.
DOI : 10.1103/PhysRevLett.98.230501

S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar et al., Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, p.45021, 2009.
DOI : 10.1088/1367-2630/11/4/045021

R. Y. Cai and V. Scarani, Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, vol.11, issue.4, p.45024, 2009.
DOI : 10.1088/1367-2630/11/4/045024

M. Hayashi, Upper bounds of eavesdropper???s performances in finite-length code with the decoy method, Physical Review A, vol.76, issue.1, p.12329, 2007.
DOI : 10.1103/PhysRevA.76.012329

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. J. Cerf et al., Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, p.238, 2003.
DOI : 10.1038/nature01289

URL : https://hal.archives-ouvertes.fr/hal-00509181

A. Leverrier and P. Grangier, Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009.
DOI : 10.1103/PhysRevLett.102.180504

URL : https://hal.archives-ouvertes.fr/hal-00459177

C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph et al., Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, p.170504, 2004.
DOI : 10.1103/PhysRevLett.93.170504

J. Lodewyck and P. Grangier, Tight bound on the coherent-state quantum key distribution with heterodyne detection, Physical Review A, vol.76, issue.2, p.22332, 2007.
DOI : 10.1103/PhysRevA.76.022332

J. Sudjana, L. Magnin, R. García-patrón, and N. J. Cerf, Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching, Physical Review A, vol.76, issue.5, p.52301, 2007.
DOI : 10.1103/PhysRevA.76.052301

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Physical Review A, vol.79, issue.1, p.12307, 2009.
DOI : 10.1103/PhysRevA.79.012307

]. C. Silberhorn, T. C. Ralph, N. Lütkenhaus, and G. Leuchs, Continuous Variable Quantum Cryptography: Beating the 3??dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002.
DOI : 10.1103/PhysRevLett.89.167901

S. Watanabe, R. Matsumoto, and T. Uyematsu, Tomography increases key rates of quantum-key-distribution protocols, Physical Review A, vol.78, issue.4, p.42316, 2008.
DOI : 10.1103/PhysRevA.78.042316

H. K. Lo, X. Ma, and K. Chen, Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005.
DOI : 10.1103/PhysRevLett.94.230504

M. Christandl, R. König, and R. Renner, Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009.
DOI : 10.1103/PhysRevLett.102.020504

S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-brouri et al., Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009.
DOI : 10.1088/1367-2630/11/4/045023

URL : https://hal.archives-ouvertes.fr/hal-00553585

A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008.
DOI : 10.1103/PhysRevA.77.042325

S. Popescu, A. Short, and A. Winter, Entanglement and the foundations of statistical mechanics, Nature Physics, vol.188, issue.11, p.754, 2006.
DOI : 10.1209/epl/i2005-10363-0

R. König, R. Renner, and C. Schaffner, The Operational Meaning of Min- and Max-Entropy, IEEE Transactions on Information Theory, vol.55, issue.9, p.4337, 2009.
DOI : 10.1109/TIT.2009.2025545

G. Van-assche, J. Cardinal, and N. J. Cerf, Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, p.394, 2004.
DOI : 10.1109/TIT.2003.822618

A. Leverrier, E. Karpov, P. Grangier, and N. Cerf, Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.115009, 2009.
DOI : 10.1088/1367-2630/11/11/115009

URL : https://hal.archives-ouvertes.fr/hal-00554926

A. Leverrier and P. Grangier, Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.81, issue.6, p.62314, 2010.
DOI : 10.1103/PhysRevA.81.062314

URL : https://hal.archives-ouvertes.fr/hal-00553558

M. Navascués, F. Grosshans, and A. Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006.
DOI : 10.1103/PhysRevLett.97.190502

R. García-patrón and N. J. Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.190503, 2006.
DOI : 10.1103/PhysRevLett.97.190503