V. Scarani, H. Bechmann-pasquinucci, N. Cerf, M. Du?ek, N. Lütkenhaus et al., The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009.
DOI : 10.1103/RevModPhys.81.1301

N. J. Cerf and P. Grangier, From quantum cloning to quantum key distribution with continuous variables: a review (Invited), Journal of the Optical Society of America B, vol.24, issue.2, p.324, 2007.
DOI : 10.1364/JOSAB.24.000324

F. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, p.57902, 2002.
DOI : 10.1103/PhysRevLett.88.057902

URL : https://hal.archives-ouvertes.fr/hal-00509124

R. García-patrón and N. J. Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.190503, 2006.
DOI : 10.1103/PhysRevLett.97.190503

M. Navascués, F. Grosshans, and A. Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006.
DOI : 10.1103/PhysRevLett.97.190502

A. Leverrier and P. Grangier, Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.81, issue.6, p.62314, 2010.
DOI : 10.1103/PhysRevA.81.062314

URL : https://hal.archives-ouvertes.fr/hal-00553558

R. Renner and J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009.
DOI : 10.1103/PhysRevLett.102.110504

J. Lodewyck, with an all-fiber continuous-variable system, Physical Review A, vol.76, issue.4, p.42305, 2007.
DOI : 10.1103/PhysRevA.76.042305

S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-brouri et al., Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009.
DOI : 10.1088/1367-2630/11/4/045023

URL : https://hal.archives-ouvertes.fr/hal-00553585

A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008.
DOI : 10.1103/PhysRevA.77.042325

M. M. Wolf, G. Giedke, and J. I. Cirac, Extremality of Gaussian Quantum States, Physical Review Letters, vol.96, issue.8, p.80502, 2006.
DOI : 10.1103/PhysRevLett.96.080502

A. Leverrier, E. Karpov, P. Grangier, and N. J. Cerf, Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.115009, 2009.
DOI : 10.1088/1367-2630/11/11/115009

URL : https://hal.archives-ouvertes.fr/hal-00554926

A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A, vol.81, issue.6, p.62343, 2010.
DOI : 10.1103/PhysRevA.81.062343

URL : https://hal.archives-ouvertes.fr/hal-00553554

C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph et al., Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, p.170504, 2004.
DOI : 10.1103/PhysRevLett.93.170504

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. Cerf et al., Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, p.238, 2003.
DOI : 10.1038/nature01289

URL : https://hal.archives-ouvertes.fr/hal-00509181

A. Leverrier and P. Grangier, Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009.
DOI : 10.1103/PhysRevLett.102.180504

URL : https://hal.archives-ouvertes.fr/hal-00459177

M. Zhao, J. Heid, N. Rigas, and . Lütkenhaus, Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Physical Review A, vol.79, issue.1, p.12307, 2009.
DOI : 10.1103/PhysRevA.79.012307

R. Y. Cai and V. Scarani, Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, vol.11, issue.4, p.45024, 2009.
DOI : 10.1088/1367-2630/11/4/045024

M. Christandl, R. König, and R. Renner, Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009.
DOI : 10.1103/PhysRevLett.102.020504

L. Sheridan, T. P. Le, and V. Scarani, Finite-key security against coherent attacks in quantum key distribution, New Journal of Physics, vol.12, issue.12, p.123019, 2010.
DOI : 10.1088/1367-2630/12/12/123019

T. Richardson, M. Shokrollahi, and R. Urbanke, Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, p.619, 2001.
DOI : 10.1109/18.910578

T. Richardson and R. Urbanke, Workshop honoring Prof. Bob McEliece on his 60th birthday, p.24, 2002.

A. Leverrier, Ecole Nationale Supérieure des Télécommunications, 2009.

A. Leverrier and N. J. Cerf, Quantum de Finetti theorem in phase-space representation, Physical Review A, vol.80, issue.1, p.10102, 2009.
DOI : 10.1103/PhysRevA.80.010102

F. Mezzadri, e-print arXiv:math-ph/0609050, pp.42312-42327