The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009. ,
DOI : 10.1103/RevModPhys.81.1301
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, vol.85, issue.2, p.441, 2000. ,
DOI : 10.1103/PhysRevLett.85.441
Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, p.80501, 2005. ,
DOI : 10.1103/PhysRevLett.95.080501
Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005. ,
DOI : 10.1103/PhysRevA.72.012332
e-print arXiv:quant-ph, 2005. ,
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009. ,
DOI : 10.1103/PhysRevLett.102.110504
Device-Independent Security of Quantum Cryptography against Collective Attacks, Physical Review Letters, vol.98, issue.23, p.230501, 2007. ,
DOI : 10.1103/PhysRevLett.98.230501
Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, p.45021, 2009. ,
DOI : 10.1088/1367-2630/11/4/045021
Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, vol.11, issue.4, p.45024, 2009. ,
DOI : 10.1088/1367-2630/11/4/045024
Upper bounds of eavesdropper???s performances in finite-length code with the decoy method, Physical Review A, vol.76, issue.1, p.12329, 2007. ,
DOI : 10.1103/PhysRevA.76.012329
Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, p.238, 2003. ,
DOI : 10.1038/nature01289
URL : https://hal.archives-ouvertes.fr/hal-00509181
Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009. ,
DOI : 10.1103/PhysRevLett.102.180504
URL : https://hal.archives-ouvertes.fr/hal-00459177
Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, p.170504, 2004. ,
DOI : 10.1103/PhysRevLett.93.170504
Tight bound on the coherent-state quantum key distribution with heterodyne detection, Physical Review A, vol.76, issue.2, p.22332, 2007. ,
DOI : 10.1103/PhysRevA.76.022332
Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching, Physical Review A, vol.76, issue.5, p.52301, 2007. ,
DOI : 10.1103/PhysRevA.76.052301
Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Physical Review A, vol.79, issue.1, p.12307, 2009. ,
DOI : 10.1103/PhysRevA.79.012307
Continuous Variable Quantum Cryptography: Beating the 3??dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002. ,
DOI : 10.1103/PhysRevLett.89.167901
Tomography increases key rates of quantum-key-distribution protocols, Physical Review A, vol.78, issue.4, p.42316, 2008. ,
DOI : 10.1103/PhysRevA.78.042316
Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005. ,
DOI : 10.1103/PhysRevLett.94.230504
Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009. ,
DOI : 10.1103/PhysRevLett.102.020504
Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009. ,
DOI : 10.1088/1367-2630/11/4/045023
URL : https://hal.archives-ouvertes.fr/hal-00553585
Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008. ,
DOI : 10.1103/PhysRevA.77.042325
Entanglement and the foundations of statistical mechanics, Nature Physics, vol.188, issue.11, p.754, 2006. ,
DOI : 10.1209/epl/i2005-10363-0
The Operational Meaning of Min- and Max-Entropy, IEEE Transactions on Information Theory, vol.55, issue.9, p.4337, 2009. ,
DOI : 10.1109/TIT.2009.2025545
Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, p.394, 2004. ,
DOI : 10.1109/TIT.2003.822618
Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.115009, 2009. ,
DOI : 10.1088/1367-2630/11/11/115009
URL : https://hal.archives-ouvertes.fr/hal-00554926
Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.81, issue.6, p.62314, 2010. ,
DOI : 10.1103/PhysRevA.81.062314
URL : https://hal.archives-ouvertes.fr/hal-00553558
Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006. ,
DOI : 10.1103/PhysRevLett.97.190502
Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.190503, 2006. ,
DOI : 10.1103/PhysRevLett.97.190503