. Tab, Liste de trinômes irréductibles à coefficients dans GF (2) de la forme X l + X s + 1. Ces polynômes permettent de définir une représentation polynomiale de GF (2 l ) La recherche de polynômes irréductibles de grand degré est une tâche difficile, Brent et al. [76] ont conçu un algorithme permettant de tester l'irréductibilité des trinômes dont le degré l est tel que 2 l ? 1 est premier

M. Hillery, Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000.
DOI : 10.1103/PhysRevA.61.022309

URL : http://arxiv.org/abs/quant-ph/9909006

T. C. Ralph, Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 2000.
DOI : 10.1103/PhysRevA.61.010303

URL : http://arxiv.org/abs/quant-ph/9907073

N. J. Cerf, M. Lévy, and G. Van-assche, Quantum distribution of Gaussian keys using squeezed states, Physical Review A, vol.63, issue.5, p.52311, 2001.
DOI : 10.1103/PhysRevA.63.052311

F. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, 2002.
DOI : 10.1103/PhysRevLett.88.057902

URL : https://hal.archives-ouvertes.fr/hal-00509124

J. Wenger, Thèse de doctorat. Dispositifs impulsionnels pour la communication quantique à variables continues, 2004.

G. Van-assche, Quantum Cryptography and Secret-Key Distillation, 2006.
DOI : 10.1017/CBO9780511617744

M. Bloch, A. Thangaraj, and S. W. Mclaughlin, Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes. E-print cs, p.509041, 2005.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of Applied Cryptography
DOI : 10.1201/9781439821916

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715
DOI : 10.1002/j.1538-7305.1949.tb00928.x

C. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, IEEE International Conference on Computers, Systems and Signal Processing, pp.175-179, 1984.
DOI : 10.1016/j.tcs.2014.05.025

URL : http://doi.org/10.1016/j.tcs.2014.05.025

I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

N. J. Cerf, A. Ipe, and X. Rottenberg, Cloning of Continuous Quantum Variables, Physical Review Letters, vol.85, issue.8, p.1754, 2000.
DOI : 10.1103/PhysRevLett.85.1754

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. Cerf et al., Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, pp.238-241, 2003.
DOI : 10.1038/nature01289

URL : https://hal.archives-ouvertes.fr/hal-00509181

C. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 0201.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

J. C. David and . Mackay, Information Theory, Inference and Learning Algorithms, 2003.

-. Hans, T. C. Bachor, and . Ralph, A Guide to Experiments in Quantum Optics, 2004.

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-brouri, and P. Grangier, Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variable, Quantum Information and Computation, vol.3, 2003.

A. Einstein, B. Podolsky, and N. Rosen, Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?, Physical Review, vol.47, issue.10, p.777, 1935.
DOI : 10.1103/PhysRev.47.777

J. Fiurásek, Optical Implementation of Continuous-Variable Quantum Cloning Machines, Physical Review Letters, vol.86, issue.21, p.4942, 2001.
DOI : 10.1103/PhysRevLett.86.4942

R. Namiki, M. Koashi, and N. Imoto, Cloning and optimal Gaussian individual attacks for a continuous-variable quantum key distribution using coherent states and reverse reconciliation, Physical Review A, vol.73, issue.3, p.32302, 2006.
DOI : 10.1103/PhysRevA.73.032302

URL : http://arxiv.org/abs/quant-ph/0511207

N. Lütkenhaus and M. Jahma, Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack, New Journal of Physics, vol.4, p.44, 2002.
DOI : 10.1088/1367-2630/4/1/344

W. Hwang, Quantum Key Distribution with High Loss: Toward Global Secure Communication, Physical Review Letters, vol.91, issue.5, p.57901, 2003.
DOI : 10.1103/PhysRevLett.91.057901

URL : http://arxiv.org/abs/quant-ph/0211153

Y. Zhao, B. Qi, X. Ma, H. Lo, and L. Qian, Experimental Quantum Key Distribution with Decoy States, Physical Review Letters, vol.96, issue.7, p.70502, 2006.
DOI : 10.1103/PhysRevLett.96.070502

URL : http://arxiv.org/abs/quant-ph/0503192

A. Zavatta, S. Viciani, and M. Bellini, Tomographic reconstruction of the single-photon Fock state by high-frequency homodyne detection, Physical Review A, vol.70, issue.5, p.53821, 2004.
DOI : 10.1103/PhysRevA.70.053821

D. Collins, N. Gisin, and H. De-riedmatten, Quantum relays for long distance quantum cryptography, Journal of Modern Optics, vol.72, issue.5, p.735, 2005.
DOI : 10.1109/18.256484

URL : http://arxiv.org/abs/quant-ph/0311101

F. Grosshans and P. Grangier, Quantum cloning and teleportation criteria for continuous quantum variables, Physical Review A, vol.64, issue.1, p.10301, 2001.
DOI : 10.1103/PhysRevA.64.010301

URL : https://hal.archives-ouvertes.fr/hal-00509127

L. Samuel, N. J. Braunstein, S. Cerf, . Iblisdir, S. Peter-van-loock et al., Optimal Cloning of Coherent States with a Linear Amplifier and Beam Splitters, Physical Review Letters, vol.86, p.4938, 2001.

C. Weedbrook, A. M. Lance, P. Warwick, T. Bowen, T. C. Symul et al., Coherent-state quantum key distribution without random basis switching, Physical Review A, vol.73, issue.2, p.22316, 2006.
DOI : 10.1103/PhysRevA.73.022316

URL : http://arxiv.org/abs/quant-ph/0508169

L. Ulrik, V. Andersen, G. Josse, and . Leuchs, Unconditional Quantum Cloning of Coherent States with Linear Optics, Physical Review Letters, vol.94, p.240503, 2005.

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph et al., No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light, Physical Review Letters, vol.95, issue.18, p.180503, 2005.
DOI : 10.1103/PhysRevLett.95.180503

URL : http://arxiv.org/abs/quant-ph/0504004

R. Renner, Security of Quantum Key Distribution. E-print quant-ph, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00917115

F. Grosshans and N. J. Cerf, Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks, Physical Review Letters, vol.92, issue.4, 2004.
DOI : 10.1103/PhysRevLett.92.047905

URL : http://arxiv.org/abs/quant-ph/0311006

W. Beckner, Inequalities in Fourier Analysis, The Annals of Mathematics, vol.102, issue.1, pp.159-182, 1975.
DOI : 10.2307/1970980

F. Grosshans, CollectiveAttacks and Unconditional Security in Continuous Variable Quantum KeyDistribution, Physical Review Letters, vol.94, issue.2, p.20504, 2005.
DOI : 10.1103/PhysRevLett.94.020504

URL : http://arxiv.org/abs/quant-ph/0407148

M. Navascu-'es and A. Ac, SecurityBounds for Continuous Variables Quantum Key Distribution, Physical Review Letters, vol.94, issue.2, p.20505, 2005.
DOI : 10.1103/PhysRevLett.94.020505

A. S. Holevo, The capacity of the quantum channel with general signal states, IEEE Transactions on Information Theory, vol.44, issue.1, pp.269-273, 1998.
DOI : 10.1109/18.651037

M. Navascues, F. Grosshans, and A. Acin, Optimality of Gaussian Attacks in Continuous Variable Quantum Cryptography. E-print quant-ph/0608034, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00105621

R. Garcia-patron and N. J. Cerf, Unconditional optimality of Gaussian attacks against continuous-variable QKD. E-print quant-ph/0608032, 2006.

R. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005.
DOI : 10.1103/PhysRevA.72.012332

URL : http://archive-ouverte.unige.ch/unige:36758

M. Christandl, R. Renner, and A. Ekert, A Generic Security Proof for Quantum Key Distribution. E-print quant-ph, 2004.

N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems, Physical Review A, vol.73, issue.2, p.22320, 2006.
DOI : 10.1103/PhysRevA.73.022320

URL : http://arxiv.org/abs/quant-ph/0507063

. Ch, T. C. Silberhorn, N. Ralph, G. Lütkenhaus, and . Leuchs, Continuous Variable Quantum Cryptography : Beating the 3 dB Loss Limit, Physical Review Letters, vol.89, p.167901, 2002.

R. Namiki and T. Hirano, Security of continuous-variable quantum cryptography using coherent states: Decline of postselection advantage, Physical Review A, vol.72, issue.2, p.24301, 2005.
DOI : 10.1103/PhysRevA.72.024301

M. Heid and N. Lütkenhaus, Security of coherent state quantum cryptography in the presence of excess noise. E-print quant-ph/0608015, 2006.

J. Lodewyck, T. Debuisschert, R. Tualle-brouri, and P. Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005.
DOI : 10.1103/PhysRevA.72.050303

H. Hansen, T. Aichele, C. Hettich, P. Lodahl, A. I. Lvovsky et al., Ultrasensitive pulsed, balanced homodyne detector:???application to time-domain quantum measurements, Optics Letters, vol.26, issue.21, pp.1714-1716, 2001.
DOI : 10.1364/OL.26.001714

URL : http://arxiv.org/abs/quant-ph/0104084

J. Lodewyck, R. García-patrón, T. Debuisschert, R. Tualle-brouri, N. J. Cerf et al., Experimental implementation of non-Gaussian attacks on a continuous-variable quantum key distribution system, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00509168

J. Lodewyck, T. Debuisschert, R. Tualle-bouri, and P. Grangier, Système de distribution quantique de clé de cryptage à variables continues, Numéro FR, vol.04, p.13337, 2004.

H. William, B. P. Press, S. A. Flannery, W. T. Teukolsky, and . Vetterling, Numerical Recipes in C, 1992.

R. Douglas and . Stinson, Universal Hashing and Authentication Codes, Lecture Notes in Computer Science, vol.576, pp.74-85, 1991.

C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1915-1923, 1995.
DOI : 10.1109/18.476316

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666

J. Thomas, L. Richardson-et-rüdiger, and . Urbanke, Efficient Encoding of Low-Density Parity- Check Codes, IEEE Transactions on Information Theory, issue.2, p.47

K. C. Nguyen, G. Van-assche, and N. J. Cerf, Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution, International Symposium on Information Theory and its Applications, 2004.

G. Brassard and L. Salvail, Secret-Key Reconciliation by Public Discussion, Lecture Notes in Computer Science, vol.765, pp.410-423, 1994.
DOI : 10.1007/3-540-48285-7_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.9686

W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue et al., Fast, efficient error reconciliation for quantum cryptography, Physical Review A, vol.67, issue.5, p.52303, 2003.
DOI : 10.1103/PhysRevA.67.052303

URL : http://arxiv.org/abs/quant-ph/0203096

M. Tüchler and J. Hagenauer, EXIT charts of irregular codes, Conference on Information Sciences and Systems, 2002.

R. G. Gallager, Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, pp.21-28, 1962.
DOI : 10.1109/TIT.1962.1057683

D. Mackay and R. Neal, Near Shannon limit performance of low density parity check codes, Electronics Letters, vol.33, issue.6, pp.457-458, 1997.
DOI : 10.1049/el:19970362

U. Wachsmann, J. B. Huber, and R. F. Fischer, Multilevel codes: theoretical concepts and practical design rules, IEEE Transactions on Information Theory, vol.45, issue.5, pp.1361-1391, 1999.
DOI : 10.1109/18.771140

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.9311

T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001.
DOI : 10.1109/18.910578

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.801

A. Shokrollahi, An efficient message-passing schedule for LDPC decoding, Proceedings of the 23rd IEEE Convention of Electrical and Electronics Engineers in Israel, pp.223-226, 2004.

A. Shokrollahi, LDPC Codes: An Introduction
DOI : 10.1007/978-3-0348-7865-4_5

A. De-baynast, P. Radosavljevic, A. Sabharwal, and J. Cavallaro, On Turbo-Schedules for LDPC Decoding, IEEE Communications Letters, 2006.

C. Berrou, The ten-year-old turbo codes are entering into service, IEEE Communications Magazine, vol.41, issue.8, pp.41110-116, 2003.
DOI : 10.1109/MCOM.2003.1222726

F. Verdier and D. Declercq, A low-cost parallel scalable FPGA architecture for regular and irregular LDPC decoding, IEEE Transactions on Communications, vol.54, issue.7, pp.1215-1223, 2006.
DOI : 10.1109/TCOMM.2006.877980

R. Brent, S. Larvala, and P. Zimmermann, A Fast Algorithm for Testing Irreducibility of Trinomials mod, 2000.
URL : https://hal.archives-ouvertes.fr/inria-00099332

U. Maurer and S. Wolf, Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, Lecture Notes in Computer Science, vol.1807, p.351, 2000.
DOI : 10.1007/3-540-45539-6_24

R. Tualle-brouri, Mémoire d'habilitation à diriger des recherches. Dispositifs pour la cryptographie quantique, 2002.

R. Douglas and . Stinson, Universal Hashing and Authentication Codes, Lecture Notes in Computer Science, vol.576, pp.74-85, 1991.

G. Ungerboeck, Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982.
DOI : 10.1109/TIT.1982.1056454

L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, Optimal decoding of linear codes for minimizing symbol error rate (Corresp.), IEEE Transactions on Information Theory, vol.20, issue.2, pp.284-287, 1974.
DOI : 10.1109/TIT.1974.1055186

G. D. Jr and . Forney, The Viterbi Algorithm, Proceedings of the IEEE, p.268, 1973.

P. Robertson, E. Hoeher, and . Villebrun, A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain, Proceedings IEEE International Conference on Communications ICC '95, pp.1009-1013, 1995.
DOI : 10.1109/ICC.1995.524253

C. Berrou, A. Glavieux, and P. Thitimajshima, Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1, Proceedings of ICC '93, IEEE International Conference on Communications, pp.1064-1070, 1993.
DOI : 10.1109/ICC.1993.397441

W. Ryan, A turbo code tutorial, 1997.