Liste de trinômes irréductibles à coefficients dans GF (2) de la forme X l + X s + 1. Ces polynômes permettent de définir une représentation polynomiale de GF (2 l ) La recherche de polynômes irréductibles de grand degré est une tâche difficile, Brent et al. [76] ont conçu un algorithme permettant de tester l'irréductibilité des trinômes dont le degré l est tel que 2 l ? 1 est premier ,
Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000. ,
DOI : 10.1103/PhysRevA.61.022309
URL : http://arxiv.org/abs/quant-ph/9909006
Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 2000. ,
DOI : 10.1103/PhysRevA.61.010303
URL : http://arxiv.org/abs/quant-ph/9907073
Quantum distribution of Gaussian keys using squeezed states, Physical Review A, vol.63, issue.5, p.52311, 2001. ,
DOI : 10.1103/PhysRevA.63.052311
Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, 2002. ,
DOI : 10.1103/PhysRevLett.88.057902
URL : https://hal.archives-ouvertes.fr/hal-00509124
Thèse de doctorat. Dispositifs impulsionnels pour la communication quantique à variables continues, 2004. ,
Quantum Cryptography and Secret-Key Distillation, 2006. ,
DOI : 10.1017/CBO9780511617744
Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes. E-print cs, p.509041, 2005. ,
Handbook of Applied Cryptography ,
DOI : 10.1201/9781439821916
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715 ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Quantum cryptography: Public key distribution and coin tossing, IEEE International Conference on Computers, Systems and Signal Processing, pp.175-179, 1984. ,
DOI : 10.1016/j.tcs.2014.05.025
URL : http://doi.org/10.1016/j.tcs.2014.05.025
Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978. ,
DOI : 10.1109/TIT.1978.1055892
Cloning of Continuous Quantum Variables, Physical Review Letters, vol.85, issue.8, p.1754, 2000. ,
DOI : 10.1103/PhysRevLett.85.1754
Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, pp.238-241, 2003. ,
DOI : 10.1038/nature01289
URL : https://hal.archives-ouvertes.fr/hal-00509181
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 0201. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Information Theory, Inference and Learning Algorithms, 2003. ,
A Guide to Experiments in Quantum Optics, 2004. ,
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable, Quantum Information and Computation, vol.3, 2003. ,
Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?, Physical Review, vol.47, issue.10, p.777, 1935. ,
DOI : 10.1103/PhysRev.47.777
Optical Implementation of Continuous-Variable Quantum Cloning Machines, Physical Review Letters, vol.86, issue.21, p.4942, 2001. ,
DOI : 10.1103/PhysRevLett.86.4942
Cloning and optimal Gaussian individual attacks for a continuous-variable quantum key distribution using coherent states and reverse reconciliation, Physical Review A, vol.73, issue.3, p.32302, 2006. ,
DOI : 10.1103/PhysRevA.73.032302
URL : http://arxiv.org/abs/quant-ph/0511207
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack, New Journal of Physics, vol.4, p.44, 2002. ,
DOI : 10.1088/1367-2630/4/1/344
Quantum Key Distribution with High Loss: Toward Global Secure Communication, Physical Review Letters, vol.91, issue.5, p.57901, 2003. ,
DOI : 10.1103/PhysRevLett.91.057901
URL : http://arxiv.org/abs/quant-ph/0211153
Experimental Quantum Key Distribution with Decoy States, Physical Review Letters, vol.96, issue.7, p.70502, 2006. ,
DOI : 10.1103/PhysRevLett.96.070502
URL : http://arxiv.org/abs/quant-ph/0503192
Tomographic reconstruction of the single-photon Fock state by high-frequency homodyne detection, Physical Review A, vol.70, issue.5, p.53821, 2004. ,
DOI : 10.1103/PhysRevA.70.053821
Quantum relays for long distance quantum cryptography, Journal of Modern Optics, vol.72, issue.5, p.735, 2005. ,
DOI : 10.1109/18.256484
URL : http://arxiv.org/abs/quant-ph/0311101
Quantum cloning and teleportation criteria for continuous quantum variables, Physical Review A, vol.64, issue.1, p.10301, 2001. ,
DOI : 10.1103/PhysRevA.64.010301
URL : https://hal.archives-ouvertes.fr/hal-00509127
Optimal Cloning of Coherent States with a Linear Amplifier and Beam Splitters, Physical Review Letters, vol.86, p.4938, 2001. ,
Coherent-state quantum key distribution without random basis switching, Physical Review A, vol.73, issue.2, p.22316, 2006. ,
DOI : 10.1103/PhysRevA.73.022316
URL : http://arxiv.org/abs/quant-ph/0508169
Unconditional Quantum Cloning of Coherent States with Linear Optics, Physical Review Letters, vol.94, p.240503, 2005. ,
No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light, Physical Review Letters, vol.95, issue.18, p.180503, 2005. ,
DOI : 10.1103/PhysRevLett.95.180503
URL : http://arxiv.org/abs/quant-ph/0504004
Security of Quantum Key Distribution. E-print quant-ph, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00917115
Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks, Physical Review Letters, vol.92, issue.4, 2004. ,
DOI : 10.1103/PhysRevLett.92.047905
URL : http://arxiv.org/abs/quant-ph/0311006
Inequalities in Fourier Analysis, The Annals of Mathematics, vol.102, issue.1, pp.159-182, 1975. ,
DOI : 10.2307/1970980
CollectiveAttacks and Unconditional Security in Continuous Variable Quantum KeyDistribution, Physical Review Letters, vol.94, issue.2, p.20504, 2005. ,
DOI : 10.1103/PhysRevLett.94.020504
URL : http://arxiv.org/abs/quant-ph/0407148
SecurityBounds for Continuous Variables Quantum Key Distribution, Physical Review Letters, vol.94, issue.2, p.20505, 2005. ,
DOI : 10.1103/PhysRevLett.94.020505
The capacity of the quantum channel with general signal states, IEEE Transactions on Information Theory, vol.44, issue.1, pp.269-273, 1998. ,
DOI : 10.1109/18.651037
Optimality of Gaussian Attacks in Continuous Variable Quantum Cryptography. E-print quant-ph/0608034, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00105621
Unconditional optimality of Gaussian attacks against continuous-variable QKD. E-print quant-ph/0608032, 2006. ,
Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005. ,
DOI : 10.1103/PhysRevA.72.012332
URL : http://archive-ouverte.unige.ch/unige:36758
A Generic Security Proof for Quantum Key Distribution. E-print quant-ph, 2004. ,
Trojan-horse attacks on quantum-key-distribution systems, Physical Review A, vol.73, issue.2, p.22320, 2006. ,
DOI : 10.1103/PhysRevA.73.022320
URL : http://arxiv.org/abs/quant-ph/0507063
Continuous Variable Quantum Cryptography : Beating the 3 dB Loss Limit, Physical Review Letters, vol.89, p.167901, 2002. ,
Security of continuous-variable quantum cryptography using coherent states: Decline of postselection advantage, Physical Review A, vol.72, issue.2, p.24301, 2005. ,
DOI : 10.1103/PhysRevA.72.024301
Security of coherent state quantum cryptography in the presence of excess noise. E-print quant-ph/0608015, 2006. ,
Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005. ,
DOI : 10.1103/PhysRevA.72.050303
Ultrasensitive pulsed, balanced homodyne detector:???application to time-domain quantum measurements, Optics Letters, vol.26, issue.21, pp.1714-1716, 2001. ,
DOI : 10.1364/OL.26.001714
URL : http://arxiv.org/abs/quant-ph/0104084
Experimental implementation of non-Gaussian attacks on a continuous-variable quantum key distribution system, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00509168
Système de distribution quantique de clé de cryptage à variables continues, Numéro FR, vol.04, p.13337, 2004. ,
Numerical Recipes in C, 1992. ,
Universal Hashing and Authentication Codes, Lecture Notes in Computer Science, vol.576, pp.74-85, 1991. ,
Generalized privacy amplification, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1915-1923, 1995. ,
DOI : 10.1109/18.476316
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666
Efficient Encoding of Low-Density Parity- Check Codes, IEEE Transactions on Information Theory, issue.2, p.47 ,
Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution, International Symposium on Information Theory and its Applications, 2004. ,
Secret-Key Reconciliation by Public Discussion, Lecture Notes in Computer Science, vol.765, pp.410-423, 1994. ,
DOI : 10.1007/3-540-48285-7_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9686
Fast, efficient error reconciliation for quantum cryptography, Physical Review A, vol.67, issue.5, p.52303, 2003. ,
DOI : 10.1103/PhysRevA.67.052303
URL : http://arxiv.org/abs/quant-ph/0203096
EXIT charts of irregular codes, Conference on Information Sciences and Systems, 2002. ,
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962. ,
DOI : 10.1109/TIT.1962.1057683
Near Shannon limit performance of low density parity check codes, Electronics Letters, vol.33, issue.6, pp.457-458, 1997. ,
DOI : 10.1049/el:19970362
Multilevel codes: theoretical concepts and practical design rules, IEEE Transactions on Information Theory, vol.45, issue.5, pp.1361-1391, 1999. ,
DOI : 10.1109/18.771140
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.9311
Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001. ,
DOI : 10.1109/18.910578
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.801
An efficient message-passing schedule for LDPC decoding, Proceedings of the 23rd IEEE Convention of Electrical and Electronics Engineers in Israel, pp.223-226, 2004. ,
LDPC Codes: An Introduction ,
DOI : 10.1007/978-3-0348-7865-4_5
On Turbo-Schedules for LDPC Decoding, IEEE Communications Letters, 2006. ,
The ten-year-old turbo codes are entering into service, IEEE Communications Magazine, vol.41, issue.8, pp.41110-116, 2003. ,
DOI : 10.1109/MCOM.2003.1222726
A low-cost parallel scalable FPGA architecture for regular and irregular LDPC decoding, IEEE Transactions on Communications, vol.54, issue.7, pp.1215-1223, 2006. ,
DOI : 10.1109/TCOMM.2006.877980
A Fast Algorithm for Testing Irreducibility of Trinomials mod, 2000. ,
URL : https://hal.archives-ouvertes.fr/inria-00099332
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, Lecture Notes in Computer Science, vol.1807, p.351, 2000. ,
DOI : 10.1007/3-540-45539-6_24
Mémoire d'habilitation à diriger des recherches. Dispositifs pour la cryptographie quantique, 2002. ,
Universal Hashing and Authentication Codes, Lecture Notes in Computer Science, vol.576, pp.74-85, 1991. ,
Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982. ,
DOI : 10.1109/TIT.1982.1056454
Optimal decoding of linear codes for minimizing symbol error rate (Corresp.), IEEE Transactions on Information Theory, vol.20, issue.2, pp.284-287, 1974. ,
DOI : 10.1109/TIT.1974.1055186
The Viterbi Algorithm, Proceedings of the IEEE, p.268, 1973. ,
A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain, Proceedings IEEE International Conference on Communications ICC '95, pp.1009-1013, 1995. ,
DOI : 10.1109/ICC.1995.524253
Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1, Proceedings of ICC '93, IEEE International Conference on Communications, pp.1064-1070, 1993. ,
DOI : 10.1109/ICC.1993.397441
A turbo code tutorial, 1997. ,