Code MATLAB pour l'optimisation de l'information mutuelle entre Alice et Eve M2=X ,
Hugues de Riedmatten et Nicolas Gisin. Multimode quantum memory based on atomic frequency combs, Phys. Rev. A, vol.79, p.52329, 2009. ,
Quantum bit escrow, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.705-714, 2000. ,
DOI : 10.1145/335305.335404
State Discrimination With Post-Measurement Information. Information Theory, IEEE Transactions on, vol.54, issue.9, pp.4183-4198, 2008. ,
Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Physical Review A, vol.59, issue.6, pp.4238-4248, 1999. ,
DOI : 10.1103/PhysRevA.59.4238
Quantum Cryptography, or Unforgeable Subway Tokens, Advances in Cryptography : Proceedings of Crypto 82 Plenum, pp.267-275, 1983. ,
DOI : 10.1007/978-1-4757-0602-4_26
Quantum cryptography: Public key distribution and coin tossing, IEEE Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp.175-179, 1984. ,
DOI : 10.1016/j.tcs.2014.05.025
Quantum cryptography without Bell's theorem, Phys. Rev. Lett, vol.68, issue.5, pp.557-559, 1992. ,
Entanglement Cost of Quantum Channels. ArXiv e-prints, 2011. ,
Observation of electromagnetically induced transparency, Physical Review Letters, vol.66, issue.20, pp.2593-2596, 1991. ,
DOI : 10.1103/PhysRevLett.66.2593
Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, vol.72, issue.3, pp.32301-61, 2005. ,
DOI : 10.1103/PhysRevA.72.032301
Quantum Bit Commitment and Coin Tossing Protocols, Advances in Cryptology : Proceedings of Crypto '90, pp.49-61, 1991. ,
DOI : 10.1007/3-540-38424-3_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.2188
A quantum bit commitment scheme provably unbreakable by both parties, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, pp.362-371, 1993. ,
DOI : 10.1109/SFCS.1993.366851
Limitations on Practical Quantum Cryptography, Physical Review Letters, vol.85, issue.6, pp.1330-1333, 2000. ,
DOI : 10.1103/PhysRevLett.85.1330
Optimal Eavesdropping in Quantum Cryptography with Six States, Physical Review Letters, vol.81, issue.14, pp.3018-3021, 1998. ,
DOI : 10.1103/PhysRevLett.81.3018
Nonlinear Magneto-optics and Reduced Group Velocity of Light in Atomic Vapor with Slow Ground State Relaxation, Physical Review Letters, vol.83, issue.9, pp.1767-1770, 1999. ,
DOI : 10.1103/PhysRevLett.83.1767
Oblivious Transfer with a Memory-Bounded Receiver, nov 1998, 1998. ,
Universal classes of hash functions, Proceedings of the ninth annual ACM symposium on Theory of computing, pp.106-112, 1977. ,
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Phys. Rev. Lett, vol.102, issue.11, p.110504, 2009. ,
Elements of Information Theory, 2006. ,
Equivalence Between Two Flavours of Oblivious Transfers, 1987. ,
DOI : 10.1007/3-540-48184-2_30
Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract), 29th annual IEEE, pp.42-52, 1988. ,
Quantum Oblivious Transfer, Journal of Modern Optics, vol.41, issue.12, pp.2445-2454, 1994. ,
DOI : 10.1007/3-540-46416-6_9
Broadcast channels with confidential messages Information Theory, IEEE Transactions on, vol.24, issue.3, pp.339-348, 1978. ,
DOI : 10.1109/tit.1978.1055892
Cryptography In the Bounded Quantum-Storage Model, Proceedings of the 46th IEEE Symposium on Foundations of Computer Science -FOCS 2005, p.449, 2005. ,
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications, Advances in Cryptology?CRYPTO '07, pp.360-378, 2007. ,
DOI : 10.1007/978-3-540-74143-5_20
Games and the Impossibility of Realizable Ideal Functionality, Theory of Cryptography, pp.360-379, 2006. ,
DOI : 10.1007/11681878_19
URL : https://hal.archives-ouvertes.fr/inria-00080683
Distillation of secret key and entanglement from quantum states, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.461, issue.2053, pp.207-235, 2005. ,
DOI : 10.1098/rspa.2004.1372
Constant-Round Oblivious Transfer in the Bounded Storage Model, Journal of Cryptology, vol.20, issue.2, pp.165-202, 2007. ,
DOI : 10.1007/s00145-006-0438-1
On mutually unbiased bases. ArXiv e-prints, 2010. ,
Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991. ,
DOI : 10.1103/PhysRevLett.67.661
Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, pp.145-195, 2002. ,
DOI : 10.1103/RevModPhys.74.145
Towards practical and fast Quantum Cryptography. eprint arXiv :quant- ph/0411022, 2004. ,
How to Solve any Protocol Problem, Proc.of STOC, 1987. ,
Graph Implementations for Nonsmooth Convex Programs, Recent Advances in Learning and Control, Lecture Notes in Control and Information Sciences, pp.95-110, 2008. ,
DOI : 10.1007/978-1-84800-155-8_7
CVX : Matlab Software for Disciplined Convex Programming, version 1.21, 2011. ,
Oblivious routing in directed graphs with random demands, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.193-201, 2005. ,
DOI : 10.1145/1060590.1060619
Quantum detection and estimation theory, Journal of Statistical Physics, vol.15, issue.1, pp.231-252, 1969. ,
DOI : 10.1007/BF01007479
A complete classification of quantum ensembles having a given density matrix, Physics Letters A, vol.183, issue.1, pp.14-18, 1993. ,
DOI : 10.1016/0375-9601(93)90880-9
Experimental demonstration of quantum memory for light, Nature, vol.6, issue.7016, pp.482-486, 2004. ,
DOI : 10.1103/PhysRevLett.85.5639
Electromagnetically Induced Transparency: Propagation Dynamics, Physical Review Letters, vol.74, issue.13, pp.2447-2450, 1995. ,
DOI : 10.1103/PhysRevLett.74.2447
Founding cryptography on oblivious transfer, Proceedings of 20th ACM STOC, pp.20-31, 1988. ,
Additivity for a class of unital qubit channels, 2001. ,
The Operational Meaning of Min- and Max-Entropy, IEEE Transactions on Information Theory, vol.55, issue.9, 2008. ,
DOI : 10.1109/TIT.2009.2025545
A Strong Converse for Classical Channel Coding Using Entangled Inputs, Physical Review Letters, vol.103, issue.7, pp.51-52, 2009. ,
DOI : 10.1103/PhysRevLett.103.070504
Unconditional security from noisy quantum storage. ArXiv e-prints, p.49, 2009. ,
Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, pp.80501-67, 2005. ,
DOI : 10.1103/PhysRevLett.95.080501
Telecommunication-Wavelength Solid-State Memory at the Single Photon Level, Physical Review Letters, vol.104, issue.8, p.80502, 2010. ,
DOI : 10.1103/PhysRevLett.104.080502
Is Quantum Bit Commitment Really Possible?, Physical Review Letters, vol.78, issue.17, pp.3410-3413, 1997. ,
DOI : 10.1103/PhysRevLett.78.3410
Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005. ,
DOI : 10.1103/PhysRevLett.94.230504
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010. ,
DOI : 10.1038/nphoton.2010.214
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher, Journal of Cryptology, vol.5, pp.53-66, 1992. ,
Secret Key Agreement by Public Discussion From Common Information, IEEE Transactions on Information Theory, vol.39, pp.733-742, 1993. ,
The Trouble with Quantum Bit Commitment. eprint arXiv :quant-ph/9603015, Mars 1996, 1996. ,
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, p.3414, 1996. ,
DOI : 10.1103/PhysRevLett.78.3414
New Measurement of the Electron Magnetic Moment Using a One-Electron Quantum Cyclotron, Physical Review Letters, vol.97, issue.3, p.30801, 2006. ,
DOI : 10.1103/PhysRevLett.97.030801
How To Exchange Secrets with Oblivious Transfer. Cryptology ePrint Archive, Report, vol.187, 1981. ,
SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.06, issue.01, pp.28-113, 2005. ,
DOI : 10.1142/S0219749908003256
URL : https://hal.archives-ouvertes.fr/hal-00917115
Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, pp.12332-76, 2005. ,
DOI : 10.1103/PhysRevA.72.012332
URL : http://archive-ouverte.unige.ch/unige:36758
Modern coding theory, 2008. ,
DOI : 10.1017/CBO9780511791338
Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Physical Review Letters, vol.92, issue.5, pp.57901-60, 2004. ,
DOI : 10.1103/PhysRevLett.92.057901
A mathematical theory of Communication. The Bell system technical journal, Juillet, vol.27, pp.379-423, 1948. ,
Communication Theory of Secrecy Systems. The Bell system technical journal, pp.656-715, 1949. ,
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, vol.85, pp.441-55, 2000. ,
SDPT3 ??? A Matlab software package for semidefinite programming, Version 1.3, Optimization Methods and Software, vol.79, issue.1-4, pp.545-581, 1999. ,
DOI : 10.1287/moor.19.1.53
Uncertainty Relation for Smooth Entropies, Physical Review Letters, vol.106, issue.11, p.110506, 2011. ,
DOI : 10.1103/PhysRevLett.106.110506
Semidefinite Programming, SIAM Review, vol.38, issue.1, pp.49-95, 1994. ,
DOI : 10.1137/1038003
New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981. ,
DOI : 10.1016/0022-0000(81)90033-7
Cryptography from Noisy Storage, Physical Review Letters, vol.100, issue.22, pp.220502-220551, 2008. ,
DOI : 10.1103/PhysRevLett.100.220502
URL : http://arxiv.org/abs/0711.2895
A single quantum cannot be cloned, Nature, vol.15, issue.5886, pp.802-803, 1982. ,
DOI : 10.1038/299802a0