S. Agnolini and P. Gallion, Implementation of BB84 protocol by QPSK modulation using dual-electrode Mach-Zehnder modulator, 2004 IEEE International Conference on Industrial Technology, 2004. IEEE ICIT '04., 2004.
DOI : 10.1109/ICIT.2004.1490292

R. Alleaume, F. Treussart, J. Courty, and J. Roch, Photon statistics characterization of a single-photon source, New Journal of Physics, vol.6, p.85, 2004.
DOI : 10.1088/1367-2630/6/1/085

A. Barenco, D. Deutsch, A. Ekert, and R. Jozsa, Conditional Quantum Dynamics and Logic Gates, Physical Review Letters, vol.74, issue.20, pp.4083-4086, 1995.
DOI : 10.1103/PhysRevLett.74.4083

URL : http://arxiv.org/abs/quant-ph/9503017

J. Basdevant and J. Dalibart, Mécanique quantique. Les éditions de l'école polytechnique, 2006.

C. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984.
DOI : 10.1016/j.tcs.2014.05.025

URL : http://doi.org/10.1016/j.tcs.2014.05.025

C. H. Bennett, F. Bessette, G. Brassard, and L. Salvail, Experimental quantum cryptography, Journal of Cryptology, vol.5, issue.1, pp.1-28, 1992.
DOI : 10.1007/bf00191318

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.3599

C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres et al., Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels, Physical Review Letters, vol.70, issue.13, pp.1895-1899, 1993.
DOI : 10.1103/PhysRevLett.70.1895

C. H. Bennett and P. W. Shor, Quantum inforamtion theory, IEEE transactions on information theory, vol.44, issue.6, 1998.

G. Brassard and L. Salvail, Secret-Key Reconciliation by Public Discussion, EUROCRYPT '93 : Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.410-423, 1994.
DOI : 10.1007/3-540-48285-7_35

J. Breguet, A. Muller, and N. Gisin, Quantum Cryptography with Polarized Photons in Optical Fibres, Journal of Modern Optics, vol.26, issue.12, pp.2405-2412, 1994.
DOI : 10.1049/el:19860703

R. Brouri, A. Beveratos, J. Poizat, and P. Grangier, Single-photon generation by pulsed excitation of a single dipole, Physical Review A, vol.62, issue.6, p.63817, 2000.
DOI : 10.1103/PhysRevA.62.063817

URL : https://hal.archives-ouvertes.fr/hal-00509183

A. R. Calderbank and P. W. Shor, Good quantum error-correcting codes exist, Physical Review A, vol.54, issue.2, pp.1098-1105, 1996.
DOI : 10.1103/PhysRevA.54.1098

URL : http://arxiv.org/abs/quant-ph/9512032

T. Chaneliere, D. N. Matsukevich, S. D. Jenkins, S. Y. Lan, T. A. Kennedy et al., Storage and retrieval of single photons transmitted between remote quantum memories, Nature, vol.9, issue.7069, p.833, 2005.
DOI : 10.1038/nature04315

E. Diamanti, Security and implementation of differential phase shift quantum key distribution systems, 2006.

D. P. Divincenzo, The physical implementation of quantum computation . Fortschritte der Physik, pp.771-783, 2000.

P. Gallion, F. J. Mendieta, and S. Jiang, Progress in Optics chapter Signal and quantum noise in optical communcation and in cryptography, 2009.

C. W. Gardiner, Quantum Noise, 1991.

D. Gottesman, H. Lo, N. Lütkenhaus, and J. Preskill, Security of quantum key distribution with imperfect devices, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 2004.
DOI : 10.1109/ISIT.2004.1365172

T. Honjo, K. Inoue, and H. Takahashi, Differential-phase-shift quantum key distribution experiment with a planar light-wave circuit Mach???Zehnder interferometer, Optics Letters, vol.29, issue.23, pp.2797-2799, 2004.
DOI : 10.1364/OL.29.002797

W. Hwang, Quantum Key Distribution with High Loss: Toward Global Secure Communication, Physical Review Letters, vol.91, issue.5, p.57901, 2003.
DOI : 10.1103/PhysRevLett.91.057901

I. Quantique, Single-Photon Detector Module, Operating Guide

G. John and . Proakis, Digital Communications, 1995.

R. Keyes, Challenges for quantum computing with solid-state devices, Computer, vol.38, issue.1, pp.65-69, 2005.
DOI : 10.1109/MC.2005.13

D. Kielpinski, A. Ben-kish, J. Britton, V. Meyer, M. A. Rowe et al., Recent results in trapped-ion quantum computing at nist, Proceedings of the International Conference on Experimental Implementation of Quantum Computation, pp.79-90, 2001.

D. Knuth, The art of Computer Programming, 2005.

H. Lo, X. Ma, and K. Chen, Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005.
DOI : 10.1103/PhysRevLett.94.230504

C. Marand and P. D. Townsend, Quantum key distribution over distances as long as 30 km, Optics Letters, vol.20, issue.16, p.1695, 1995.
DOI : 10.1364/OL.20.001695

H. Mathieu, Physique des semiconducteurs et des composants électroniques . Dunod, 2004.

J. Mérolla, Y. Mazurenko, J. Goedgebuer, and W. T. Rhodes, Single-Photon Interference in Sidebands of Phase-Modulated Light for Quantum Cryptography, Physical Review Letters, vol.82, issue.8, pp.1656-1659, 1999.
DOI : 10.1103/PhysRevLett.82.1656

A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden et al., ???Plug and play??? systems for quantum cryptography, Applied Physics Letters, vol.70, issue.7, pp.793-795, 1997.
DOI : 10.1063/1.118224

R. Namiki and T. Hirano, Security of quantum cryptography using balanced homodyne detection, Physical Review A, vol.67, issue.2, p.22308, 2003.
DOI : 10.1103/PhysRevA.67.022308

W. T. Nicolas-gisin, G. Ribordy, and H. Zbinden, Quantum cryptography . Reviews of modern physics, 2002.

G. Ribordy, J. Gautier, N. Gisin, O. Guinnard, and H. Zbinden, Automated ???plug & play??? quantum key distribution, Electronics Letters, vol.34, issue.22, pp.2116-2117, 1998.
DOI : 10.1049/el:19981473

M. Sabban, Q. Xu, P. Gallion, and F. Mendieta, Security Evaluation of Dual-Threshold Homodyne Quantum Cryptographic Systems, International Conference on Quantum Information, p.77, 2008.
DOI : 10.1364/ICQI.2008.JMB77

B. Schneier, Applied Cryptography, 1996.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Shields, Single photon quantum cryptography and devices, Conference on Lasers and Electro-Optics/International Quantum Electronics Conference and Photonic Applications Systems Technologies, p.3, 2004.
DOI : 10.1364/IQEC.2004.IWE3

P. W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.
DOI : 10.1109/SFCS.1994.365700

P. W. Shor, Scheme for reducing decoherence in quantum computer memory, Physical Review A, vol.52, issue.4, pp.2493-2496, 1995.
DOI : 10.1103/PhysRevA.52.R2493

P. W. Shor and J. Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, vol.85, issue.2, p.441, 2000.
DOI : 10.1103/PhysRevLett.85.441

S. Takeuchi, R. Okamoto, and K. Sasaki, High-yield single-photon source using gated spontaneous parametric downconversion, Applied Optics, vol.43, issue.30, pp.5708-5711, 2004.
DOI : 10.1364/AO.43.005708

A. Tosi, S. Cova, F. Zappa, M. Itzler, and R. Ben-michael, InGaAs/InP Single Photon Avalanche Diode Design and Characterization, 2006 European Solid-State Device Research Conference, pp.335-338, 2006.
DOI : 10.1109/ESSDER.2006.307706

I. L. Sherwood and . Chuang, Experimental realization of shor's quantum factoring algorithm using nuclear magnetic resonance, Nature, vol.414, pp.883-887, 2001.

M. B. Ward, O. Z. Karimov, P. Atkinson, D. C. Unitt, Z. Yuan et al., Telecom wavelength quantum dot single photon source, 2005 Quantum Electronics and Laser Science Conference, p.3, 2005.
DOI : 10.1109/QELS.2005.1548702

W. K. Wootters and W. H. Zurek, A single quantum cannot be cloned, Nature, vol.15, issue.5886, pp.802-803, 1982.
DOI : 10.1038/299802a0

Q. Xu, M. C. Silva, M. Sabban, P. Gallion, and F. Mendieta, Dualthreshold balanced homodyne detection at 1550nm optical fiber quantum key distribution system, Journal of Lightwave Technology, 2009.
DOI : 10.1109/jlt.2008.2009949

Q. Xu, M. Sabban, and P. Gallion, Homodyne detection of weak coherent optical pulse : Applications to quantum cryptography. Microwave and Optical Technology Letters, 2009.

Q. Xu, M. Sabban, P. Gallion, and F. Mendieta, Dual-Threshold Receiver for 1550nm Homodyne QPSK Quantum Key Distribution System, Coherent Optical Technologies and Applications, p.4, 2008.
DOI : 10.1364/COTA.2008.CWC4

Q. Xu, M. Sabban, P. Gallion, and F. Mendieta, Quantum key distribution system using dual-threshold homodyne detection, 2008 IEEE International Conference on Research, Innovation and Vision for the Future in Computing and Communication Technologies, pp.1-8, 2008.
DOI : 10.1109/RIVF.2008.4586325

H. Zbinden, J. Gautier, N. Gisin, B. Huttner, A. Muller et al., Interferometry with Faraday mirrors for quantum cryptography, Electronics Letters, vol.33, issue.7, pp.586-588, 1997.
DOI : 10.1049/el:19970427

Y. Zhao, B. Qi, X. Ma, H. Lo, and L. Qian, Experimental Quantum Key Distribution with Decoy States, Physical Review Letters, vol.96, issue.7, p.70502, 2006.
DOI : 10.1103/PhysRevLett.96.070502

M. Sabban, Q. Xu, P. Gallion, and F. J. Mendieta, Security Evaluation of Dual-Threshold Homodyne Quantum Cryptographic Systems, International Conference on Quantum Information, p.77, 2008.
DOI : 10.1364/ICQI.2008.JMB77

Q. Xu, M. B. Costa-e-silva, M. Sabban, P. Gallion, and F. J. Mendieta, Dual-threshold balanced homodyne detection at 1550nm optical fiber quantum key distribution system, Journal of Lightwave Technology, 2009.
DOI : 10.1109/jlt.2008.2009949

Q. Xu, M. Sabban, and P. Gallion, Homodyne detection of weak coherent optical pulse : Applications to quantum cryptography . Microwave and Optical Technology Letters, 2009.

Q. Xu, M. Sabban, P. Gallion, and F. J. Mendieta, Dualthreshold receiver for 1550nm homodyne qpsk quantum key distribution system Quantum key distribution system using dualthreshold homodyne detection, Coherent Optical Technologies and ApplicationsSGM08] Qing Xu 0006 RIVF, pp.4-5, 2008.