A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio et al., Device-Independent Security of Quantum Cryptography against Collective Attacks, Physical Review Letters, issue.23, p.98230501, 2007.

A. Acín, N. Gisin, and L. Masanes, From Bell???s Theorem to Secure Quantum Key Distribution, Physical Review Letters, vol.97, issue.12, p.120405, 2006.
DOI : 10.1103/PhysRevLett.97.120405

J. F. Adams, Vector Fields on Spheres, The Annals of Mathematics, vol.75, issue.3, pp.603-632, 1962.
DOI : 10.2307/1970213

URL : http://dx.doi.org/10.1016/0040-9383(62)90096-4

G. Adesso and F. Illuminati, Entanglement in continuous-variable systems: recent advances and current perspectives, Journal of Physics A: Mathematical and Theoretical, vol.40, issue.28, pp.7821-7880, 2007.
DOI : 10.1088/1751-8113/40/28/S01

R. Alléaume, F. Roueff, E. Diamanti, and N. Lütkenhaus, Topological optimization of quantum key distribution networks, New Journal of Physics, vol.11, issue.7, 2009.
DOI : 10.1088/1367-2630/11/7/075002

B. D. Arvind, N. Mukunda, and R. Simon, The real symplectic groups in quantum mechanics and optics, Pramana, vol.70, issue.6, p.471, 1995.
DOI : 10.1007/BF02848172

Y. Aumann and M. O. Rabin, Information Theoretically Secure Communication in the Limited Storage Space Model, Lecture Notes in Computer Science, pp.65-79, 1999.
DOI : 10.1007/3-540-48405-1_5

K. Bencheikh, T. Symul, A. Jankovic, and J. Levenson, Quantum key distribution with continuous variables, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp.1903-1920, 1984.
DOI : 10.1364/OL.16.001234

C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, Generalized privacy amplification. Information Theory, IEEE Transactions on, vol.41, issue.6, pp.1915-1923, 1995.
DOI : 10.1109/18.476316

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Physical Review Letters, vol.68, issue.21, pp.3121-3124, 1992.
DOI : 10.1103/PhysRevLett.68.3121

C. Berrou, A. Glavieux, and P. Thitimajshima, Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1, Proceedings of ICC '93, IEEE International Conference on Communications, 1993.
DOI : 10.1109/ICC.1993.397441

M. Bloch, A. Thangaraj, S. W. Mclaughlin, and J. M. Merolla, LDPC-based Gaussian key reconciliation, 2006 IEEE Information Theory Workshop, p.6, 2006.
DOI : 10.1109/ITW.2006.1633793

URL : https://hal.archives-ouvertes.fr/hal-00362753

A. Botero and B. Reznik, Modewise entanglement of Gaussian states, Physical Review A, vol.67, issue.5, p.52311, 2003.
DOI : 10.1103/PhysRevA.67.052311

G. Brassard, Is information the key?, Nature Physics, vol.5, issue.4, pp.2-4, 2005.
DOI : 10.1007/BF02058098

G. Brassard, D. Chaum, and C. Crépeau, Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, vol.37, issue.2, pp.156-189, 1988.
DOI : 10.1016/0022-0000(88)90005-0

G. Brassard, C. Crepeau, R. Jozsa, and D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, pp.362-371, 1993.
DOI : 10.1109/SFCS.1993.366851

G. Brassard and L. Salvail, Secret-Key Reconciliation by Public Discussion, Lecture Notes in Computer Science, vol.765, pp.410-423, 1994.
DOI : 10.1007/3-540-48285-7_35

M. Brune, J. Bernu, C. Guerlin, S. Deléglise, C. Sayrin et al., Process Tomography of Field Damping and Measurement of Fock State Lifetimes by Quantum Nondemolition Photon Counting in a Cavity, Physical Review Letters, vol.101, issue.24, p.240402, 2008.
DOI : 10.1103/PhysRevLett.101.240402

URL : https://hal.archives-ouvertes.fr/hal-00319638

Y. Q. Raymond, V. Cai, and . Scarani, Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, vol.11, issue.4, 2009.

A. R. Calderbank and P. W. Shor, Good quantum error-correcting codes exist, Physical Review A, vol.54, issue.2, pp.1098-1105, 1996.
DOI : 10.1103/PhysRevA.54.1098

URL : http://arxiv.org/abs/quant-ph/9512032

C. M. Caves, C. A. Fuchs, and R. Schack, Unknown quantum states: The quantum de Finetti representation, Journal of Mathematical Physics, vol.43, issue.9, p.4537, 2002.
DOI : 10.1063/1.1494475

N. J. Cerf and C. Adami, Negative Entropy and Information in Quantum Mechanics, Physical Review Letters, vol.79, issue.26, pp.5194-5197, 1997.
DOI : 10.1103/PhysRevLett.79.5194

N. J. Cerf, A. Ipe, and X. Rottenberg, Cloning of Continuous Quantum Variables, Physical Review Letters, vol.85, issue.8, pp.1754-1757, 2000.
DOI : 10.1103/PhysRevLett.85.1754

N. J. Cerf and P. Grangier, From quantum cloning to quantum key distribution with continuous variables: a review (Invited), Journal of the Optical Society of America B, vol.24, issue.2, pp.324-334, 2007.
DOI : 10.1364/JOSAB.24.000324

N. Cerf, M. Levy, and G. V. Assche, Quantum distribution of Gaussian keys using squeezed states, Physical Review A, vol.63, issue.5, p.52311, 2001.
DOI : 10.1103/PhysRevA.63.052311

A. Chefles, Quantum state discrimination, Contemporary Physics, vol.41, issue.6, pp.401-424, 2000.
DOI : 10.1080/00107510010002599

G. Chiribella, G. M. D-'ariano, P. Perinotti, R. F. Schlingemann, and . Werner, A short impossibility proof of quantum bit commitment, Physics Letters A, vol.377, issue.15, 2009.
DOI : 10.1016/j.physleta.2013.02.045

M. Christandl, R. König, G. Mitchison, and R. Renner, One-and-a-Half Quantum de Finetti Theorems, Communications in Mathematical Physics, vol.90, issue.2, pp.473-498, 2007.
DOI : 10.1007/s00220-007-0189-3

URL : http://arxiv.org/abs/quant-ph/0602130

M. Christandl, R. König, and R. Renner, Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009.
DOI : 10.1103/PhysRevLett.102.020504

R. Clifton, J. Bub, and H. Halvorson, Characterizing quantum theory in terms of information-theoretic constraints, Foundations of Physics, vol.33, issue.11, pp.1561-1591, 2003.
DOI : 10.1023/A:1026056716397

T. M. Cover and J. A. Thomas, Elements of information theory, 2006.

I. B. Damgard, S. Fehr, L. Salvail, and C. Schaffner, Cryptography in the bounded quantum-storage model, Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on, pp.449-458, 2005.

G. Mauro, D. Ariano, D. Kretschmann, D. Schlingemann, and R. F. Werner, Reexamination of quantum bit commitment: The possible and the impossible, Physical Review A, vol.76, issue.3, p.32328, 2007.

D. Christian, T. J. Cruz, R. Osborne, and . Schack, Finite de Finetti Theorem for Infinite-Dimensional Systems, Physical Review Letters, issue.16, p.98160406, 2007.

B. and D. Finetti, La prévision: Ses lois logiques, ses sources subjectives Annales de l'institut Henri Poincaré (B) Probabilités et Statistiques [38] I. Devetak and A. Winter. Distillation of secret key and entanglement from quantum states, Proc. R. Soc. A, pp.1-68, 1937.

P. Diaconis and D. Freedman, Finite Exchangeable Sequences. The Annals of Probability, pp.745-764, 1980.
DOI : 10.1214/aop/1176994663

URL : http://projecteuclid.org/download/pdf_1/euclid.aop/1176994663

P. Diaconis and D. Freedman, A dozen de Finetti-style results in search of a theory

J. Eisert and M. B. Plenio, Introduction to the basics of entanglement theory in continuous-variable systems. Arxiv preprint quant-ph, 2003.

J. Eisert, S. Scheel, and M. B. Plenio, Distilling Gaussian states with Gaussian operations is impossible. Physical review letters, p.137903, 2002.
DOI : 10.1103/physrevlett.89.137903

A. K. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991.
DOI : 10.1103/PhysRevLett.67.661

D. Elkouss, A. Leverrier, R. Alléaume, and J. J. Boutros, Efficient reconciliation protocol for discrete-variable quantum key distribution, 2009 IEEE International Symposium on Information Theory, pp.1879-1883, 2009.
DOI : 10.1109/ISIT.2009.5205475

H. Everett, "Relative State" Formulation of Quantum Mechanics, Reviews of Modern Physics, vol.29, issue.3, pp.454-462, 1957.
DOI : 10.1103/RevModPhys.29.454

R. P. Feynman, Simulating physics with computers, International Journal of Theoretical Physics, vol.21, issue.6-7, pp.467-488, 1982.
DOI : 10.1007/BF02650179

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Fossier, . Diamanti, R. Debuisschert, P. Tualle-brouri, and . Grangier, Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers, Journal of Physics B: Atomic, Molecular and Optical Physics, vol.42, issue.11, p.42114014, 2009.
DOI : 10.1088/0953-4075/42/11/114014

URL : https://hal.archives-ouvertes.fr/hal-00553544

S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-brouri et al., Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, 2009.
DOI : 10.1088/1367-2630/11/4/045023

URL : https://hal.archives-ouvertes.fr/hal-00553585

R. G. Gallager, Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, 1963.
DOI : 10.1109/TIT.1962.1057683

R. Garcia-patron, Quantum information with optical continuous variables: from Bell tests to key distribution, 2007.

R. García-patrón and N. J. Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.97190503, 2006.
DOI : 10.1103/PhysRevLett.97.190503

G. Giedke and J. I. Cirac, Characterization of Gaussian operations and distillation of Gaussian states, Physical Review A, vol.66, issue.3, p.32316, 2002.
DOI : 10.1103/PhysRevA.66.032316

N. Gisin, G. Ribordy, W. Tittel, and H. , Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, pp.145-195, 2002.
DOI : 10.1103/RevModPhys.74.145

R. J. Glauber, Coherent and Incoherent States of the Radiation Field, Physical Review, vol.131, issue.6, pp.2766-2788, 1963.
DOI : 10.1103/PhysRev.131.2766

S. Gleyzes, S. Kuhr, C. Guerlin, J. Bernu, S. Deléglise et al., Quantum jumps of light recording the birth and death of a photon in a cavity, Nature, vol.53, issue.7133, pp.446297-300, 2007.
DOI : 10.1038/nature05589

URL : https://hal.archives-ouvertes.fr/hal-00118324

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof-systems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, pp.291-304, 1985.

D. Gottesman and H. K. Lo, Proof of security of quantum key distribution with two-way classical communications, IEEE Transactions on Information Theory, vol.49, issue.2, pp.457-475, 2003.
DOI : 10.1109/TIT.2002.807289

D. Gottesman and J. Preskill, Secure quantum key distribution using squeezed states, Physical Review A, vol.63, issue.2, p.22309, 2001.
DOI : 10.1103/PhysRevA.63.022309

URL : http://arxiv.org/abs/quant-ph/0008046

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-brouri, and P. Grangier, Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables, QUANTUM INFORMATION & COMPUTATIONSp. Iss. SI, vol.3, pp.535-552, 2003.
URL : https://hal.archives-ouvertes.fr/hal-00509120

F. Grosshans and P. Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables. Arxiv preprint quant-ph/0204127, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00509122

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. J. Cerf et al., Quantum key distribution using Gaussian-modulated coherent states, Nature, issue.6920, pp.421238-241, 2003.
DOI : 10.1038/nature01289

URL : https://hal.archives-ouvertes.fr/hal-00509181

F. Grosshans, CollectiveAttacks and Unconditional Security in Continuous Variable Quantum KeyDistribution, Physical Review Letters, vol.94, issue.2, p.20504, 2005.
DOI : 10.1103/PhysRevLett.94.020504

F. Grosshans and N. J. Cerf, Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks, Physical Review Letters, vol.92, issue.4, p.47905, 2004.
DOI : 10.1103/PhysRevLett.92.047905

URL : http://arxiv.org/abs/quant-ph/0311006

F. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, p.57902, 2002.
DOI : 10.1103/PhysRevLett.88.057902

URL : https://hal.archives-ouvertes.fr/hal-00509124

H. Halvorson and J. Bub, Can quantum cryptography imply quantum mechanics? Reply to Smolin, QUANTUM INFORMATION & COMPUTATION, vol.5, issue.2, pp.170-175, 2005.

M. B. Hastings, Superadditivity of communication capacity using entangled inputs, Nature Physics, vol.9, issue.4, pp.255-257, 2009.
DOI : 10.1103/PhysRevB.76.035114

M. Heid and N. Lütkenhaus, Efficiency of coherent-state quantum cryptography in the presence of loss: Influence of realistic error correction, Physical Review A, vol.73, issue.5, p.52316, 2006.
DOI : 10.1103/PhysRevA.73.052316

M. Heid and N. Lütkenhaus, Security of coherent-state quantum cryptography in the presence of Gaussian noise, Physical Review A, vol.76, issue.2, p.22313, 2007.
DOI : 10.1103/PhysRevA.76.022313

C. W. Helström, Quantum detection and estimation theory, Journal of Statistical Physics, vol.15, issue.1, pp.231-252, 1969.
DOI : 10.1007/BF01007479

M. Hillery, Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000.
DOI : 10.1103/PhysRevA.61.022309

URL : http://arxiv.org/abs/quant-ph/9909006

P. Horodecki, Separability criterion and inseparable mixed states with positive partial transposition, Physics Letters A, vol.232, issue.5, pp.333-339, 1997.
DOI : 10.1016/S0375-9601(97)00416-7

URL : http://arxiv.org/abs/quant-ph/9703004

R. L. Hudson and G. R. Moody, Locally normal symmetric states and an analogue of de Finetti's theorem. Probability Theory and Related Fields, pp.343-351, 1976.

K. Inoue, E. Waks, and Y. Yamamoto, Differential Phase Shift Quantum Key Distribution, Physical Review Letters, vol.89, issue.3, p.37902, 2002.
DOI : 10.1103/PhysRevLett.89.037902

E. T. Jaynes, Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957.
DOI : 10.1103/PhysRev.106.620

A. Kent, Unconditionally Secure Bit Commitment, Physical Review Letters, vol.83, issue.7, pp.1447-1450, 1999.
DOI : 10.1103/PhysRevLett.83.1447

URL : http://arxiv.org/abs/quant-ph/9810068

J. Kilian, Founding crytpography on oblivious transfer, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.20-31, 1988.
DOI : 10.1145/62212.62215

A. Y. Kitaev, Quantum computations: algorithms and error correction, Russian Mathematical Surveys, vol.52, issue.6, pp.1191-1249, 1997.
DOI : 10.1070/RM1997v052n06ABEH002155

R. König, U. Maurer, and R. Renner, On the Power of Quantum Memory, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2391-2401, 2005.
DOI : 10.1109/TIT.2005.850087

R. König and R. Renner, A de Finetti representation for finite symmetric quantum states, Journal of Mathematical Physics, vol.46, issue.12, p.122108, 2005.
DOI : 10.1063/1.2146188

R. König and R. Renner, Sampling of Min-Entropy Relative to Quantum Knowledge, Workshop on Quantum Information Processing, 2007.
DOI : 10.1109/TIT.2011.2146730

R. König, R. Renner, and C. Schaffner, The operational meaning of min-and maxentropy . arXiv, 2008.

R. König and M. M. Wolf, On exchangeable continuous variable systems, Journal of Mathematical Physics, vol.50, issue.1, p.12102, 2009.
DOI : 10.1063/1.3043788

B. Kraus, N. Gisin, and R. Renner, Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, p.95080501, 2005.
DOI : 10.1103/PhysRevLett.95.080501

M. and L. Bellac, A short introduction to quantum information and quantum computation, 2006.
DOI : 10.1017/CBO9780511755361

U. Leonhardt, Measuring the quantum state of light, 1997.

A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, Multidimensional reconciliation for continuous-variable quantum key distribution, IEEE International Symposium on Information Theory, pp.1020-1024, 2008.
DOI : 10.1109/isit.2008.4595141

URL : https://hal.archives-ouvertes.fr/hal-00316160

A. Leverrier, E. Karpov, P. Grangier, and N. J. Cerf, Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.11115009, 2009.
DOI : 10.1088/1367-2630/11/11/115009

URL : https://hal.archives-ouvertes.fr/hal-00554926

A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008.
DOI : 10.1103/PhysRevA.77.042325

A. Leverrier and N. J. Cerf, Quantum de Finetti theorem in phase-space representation, Physical Review A, vol.80, issue.1, p.10102, 2009.
DOI : 10.1103/PhysRevA.80.010102

URL : http://arxiv.org/abs/0904.4862

A. Leverrier and P. Grangier, Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009.
DOI : 10.1103/PhysRevLett.102.180504

URL : https://hal.archives-ouvertes.fr/hal-00459177

L. B. Levitin, Optimal Quantum Measurements for Two Pure and Mixed States, Quantum Communications and Measurement: Proceedings of an International Workshop Held in Nottingham, p.439, 1994.
DOI : 10.1007/978-1-4899-1391-3_43

H. K. Lo, X. Ma, and K. Chen, Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005.
DOI : 10.1103/PhysRevLett.94.230504

H. Lo and H. F. Chau, Is Quantum Bit Commitment Really Possible? Physical Review Letters, pp.3410-3413, 1997.
DOI : 10.1103/physrevlett.78.3410

URL : http://arxiv.org/abs/quant-ph/9603004

J. Lodewyck, M. Bloch, R. García-patrón, S. Fossier, E. Karpov et al., with an all-fiber continuous-variable system, Physical Review A, vol.76, issue.4, p.42305, 2007.
DOI : 10.1103/PhysRevA.76.042305

URL : http://arxiv.org/abs/0706.4255

J. Lodewyck and P. Grangier, Tight bound on the coherent-state quantum key distribution with heterodyne detection, Physical Review A, vol.76, issue.2, p.22332, 2007.
DOI : 10.1103/PhysRevA.76.022332

A. I. Lvovsky and M. G. Raymer, Continuous-variable optical quantum-state tomography, Reviews of Modern Physics, vol.81, issue.1, p.299, 2009.
DOI : 10.1103/RevModPhys.81.299

URL : http://arxiv.org/abs/quant-ph/0511044

D. J. Mackay, Information theory, inference and learning algorithms, 2003.

D. J. Mackay and R. M. Neal, Near Shannon limit performance of low density parity check codes, Electronics Letters, vol.33, issue.6, pp.457-458, 1997.
DOI : 10.1049/el:19970362

L. Magnin, F. Magniez, A. Leverrier, and N. J. Cerf, Strong No-Go Theorem for Gaussian Quantum Bit Commitment Arxiv preprint arXiv:0905, 2009.
DOI : 10.1103/physreva.81.010302

URL : http://arxiv.org/abs/0905.3419

D. Mayers, Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997.
DOI : 10.1103/PhysRevLett.78.3414

URL : http://arxiv.org/abs/quant-ph/9605044

A. Montfort, Cours de statistique mathématique, Economica, 1997.

M. Navascués and A. Acín, SecurityBounds for Continuous Variables Quantum Key Distribution, Physical Review Letters, vol.94, issue.2, p.20505, 2005.
DOI : 10.1103/PhysRevLett.94.020505

M. Navascués, F. Grosshans, and A. Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006.
DOI : 10.1103/PhysRevLett.97.190502

P. Navez, Statistical confidentiality tests for a quantum transmission using continuous variables, The European Physical Journal D - Atomic, Molecular and Optical Physics, vol.18, issue.2, pp.219-228, 2002.
DOI : 10.1140/epjd/e20020026

K. Nguyen, G. Van-assche, and N. J. Cerf, Side-information coding with turbo codes and its application to quantum key distribution, Proc. International Symposium on Information Theory and its Applications, 2004.

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 2000.

J. Niset, J. Fiurá?ek, and N. J. Cerf, No-Go Theorem for Gaussian Quantum Error Correction, Physical Review Letters, vol.102, issue.12, p.120501, 2009.
DOI : 10.1103/PhysRevLett.102.120501

URL : http://arxiv.org/abs/0811.3128

B. Odom, D. Hanneke, B. D. Urso, and G. Gabrielse, New Measurement of the Electron Magnetic Moment Using a One-Electron Quantum Cyclotron, Physical Review Letters, vol.97, issue.3, p.30801, 2006.
DOI : 10.1103/PhysRevLett.97.030801

M. Ohya and D. Petz, Quantum entropy and its use, 2004.
DOI : 10.1007/978-3-642-57997-4

A. Ourjoumtsev, H. Jeong, R. Tualle-brouri, and P. Grangier, Generation of optical Schrödinger cats from photon number states, Nature, issue.7155, pp.448784-786, 2007.

A. Ourjoumtsev, R. Tualle-brouri, J. Laurat, and P. Grangier, Generating Optical Schrödinger kittens for quantum information processing, Science, issue.5770, pp.31283-86, 2006.

A. Ourjoumtsev, R. Tualle-brouri, and P. Grangier, Quantum Homodyne Tomography of a Two-Photon Fock State, Physical Review Letters, vol.96, issue.21, p.96213601, 2006.
DOI : 10.1103/PhysRevLett.96.213601

URL : https://hal.archives-ouvertes.fr/hal-00509115

A. Page, E. Poppe, G. Querasser, S. Ribordy, L. Robyr et al., The SECOQC quantum key distribution network in Vienna, New Journal of Physics, vol.11, issue.7, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00559693

A. Peres, Separability Criterion for Density Matrices, Physical Review Letters, vol.77, issue.8, pp.1413-1415, 1996.
DOI : 10.1103/PhysRevLett.77.1413

S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar et al., Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, 2009.
DOI : 10.1088/1367-2630/11/4/045021

URL : http://doi.org/10.1088/1367-2630/11/4/045021

S. Popescu, A. J. Short, and A. Winter, Entanglement and the foundations of statistical mechanics, Nature Physics, vol.188, issue.11, pp.754-758, 2006.
DOI : 10.1209/epl/i2005-10363-0

T. C. Ralph, Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 1999.
DOI : 10.1103/PhysRevA.61.010303

URL : http://arxiv.org/abs/quant-ph/9907073

M. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Physical Review A, vol.62, issue.6, p.62308, 2000.
DOI : 10.1103/PhysRevA.62.062308

R. Renner, Security of quantum key distribution. Arxiv preprint quant-ph, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00917115

R. Renner, Symmetry of large physical systems implies independence of subsystems, Nature Physics, vol.1, issue.9, pp.645-649, 2007.
DOI : 10.1038/nphys684

R. Renner and J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, 2008.
DOI : 10.1103/PhysRevLett.102.110504

R. Renner and J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009.
DOI : 10.1103/PhysRevLett.102.110504

R. Renner and S. Wolf, Smooth renyi entropy and applications, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., p.233, 2004.
DOI : 10.1109/ISIT.2004.1365269

R. Renner, S. Wolf, and J. Wullschleger, The Single-Serving Channel Capacity, 2006 IEEE International Symposium on Information Theory, pp.1424-1427, 2006.
DOI : 10.1109/ISIT.2006.262081

R. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005.
DOI : 10.1103/PhysRevA.72.012332

URL : http://archive-ouverte.unige.ch/unige:36758

T. Richardson and R. Urbanke, Multi-Edge Type LDPC Codes. Workshop honoring Prof. Bob McEliece on his 60th birthday, pp.24-25, 2002.

T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001.
DOI : 10.1109/18.910578

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

V. Scarani, Quantum physics: a first encounter: interference, entanglement, and reality, 2006.

V. Scarani and C. Kurtsiefer, The black paper of quantum cryptography: real implementation problems . Arxiv preprint 0906, 2005.

V. Scarani, H. Bechmann-pasquinucci, and N. J. Cerf, The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009.
DOI : 10.1103/RevModPhys.81.1301

V. Scarani and R. Renner, Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing, Physical Review Letters, vol.100, issue.20, 2008.
DOI : 10.1103/PhysRevLett.100.200501

]. E. Schr, odinger. Der stetigeUbergang von der Mikro-zur Makromechanik, Naturwissenschaften, vol.14, issue.28, pp.664-666, 1926.

M. O. Scully and M. S. Zubairy, Quantum optics, 1997.

A. Serafini, Multimode Uncertainty Relations and Separability of Continuous Variable States, Physical Review Letters, vol.96, issue.11, p.110402, 2006.
DOI : 10.1103/PhysRevLett.96.110402

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

P. W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.
DOI : 10.1109/SFCS.1994.365700

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Silberhorn, N. Korolkova, and G. Leuchs, Quantum key distribution with bright entangled beams. Physical review letters, p.167902, 2002.
DOI : 10.1103/physrevlett.88.167902

URL : http://arxiv.org/abs/quant-ph/0109009

. Ch, T. C. Silberhorn, N. Ralph, G. Lütkenhaus, and . Leuchs, Continuous Variable Quantum Cryptography: Beating the 3 dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002.

R. Simon, S. Chaturvedi, and V. Srinivasan, Congruences and canonical forms for a positive matrix: Application to the Schweinler???Wigner extremum principle, Journal of Mathematical Physics, vol.40, issue.7, pp.3632-3642, 1999.
DOI : 10.1063/1.532913

R. Simon, N. Mukunda, and B. Dutta, ) invariance, squeezing, and normal forms, Physical Review A, vol.49, issue.3, pp.1567-1583, 1994.
DOI : 10.1103/PhysRevA.49.1567

G. Smith and J. Yard, Quantum Communication with Zero-Capacity Channels, Science, vol.321, issue.5897, p.1812, 2008.
DOI : 10.1126/science.1162242

URL : http://arxiv.org/abs/0807.4935

J. A. Smolin, Can quantum cryptography imply quantum mechanics?, QUANTUM INFORMATION & COMPUTATION, vol.5, issue.2, pp.161-169, 2005.

R. W. Spekkens, Evidence for the epistemic view of quantum states: A toy theory, Physical Review A, vol.75, issue.3, p.32110, 2007.
DOI : 10.1103/PhysRevA.75.032110

D. Stucki, R. Thew, V. Scarani, N. Brunner, N. Gisin et al., Fast and Simple Quantum Key Distribution Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching, Appl. Phys. Lett Physical Review A, vol.87, issue.5, p.76052301, 2005.

M. Takeoka and M. Sasaki, Discrimination of the binary coherent signal: Gaussian-operation limit and simple non-Gaussian near-optimal receivers, Physical Review A, vol.78, issue.2, p.22320, 2008.
DOI : 10.1103/PhysRevA.78.022320

G. Van-assche, Quantum cryptography and secret-key distillation, 2006.
DOI : 10.1017/CBO9780511617744

G. Van-assche, J. Cardinal, and N. J. Cerf, Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, pp.394-400, 2004.
DOI : 10.1109/TIT.2003.822618

S. Watanabe, R. Matsumoto, and T. Uyematsu, Tomography increases key rates of quantum-key-distribution protocols, Physical Review A, vol.78, issue.4, p.42316, 2008.
DOI : 10.1103/PhysRevA.78.042316

S. Wiesner, Conjugate coding, ACM SIGACT News, vol.15, issue.1, pp.78-88, 1983.
DOI : 10.1145/1008908.1008920

E. Wigner, On the Quantum Correction For Thermodynamic Equilibrium, Physical Review, vol.40, issue.5, pp.749-759, 1932.
DOI : 10.1103/PhysRev.40.749

A. D. Wyner, The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

G. Y. Xiang, T. C. Ralph, A. P. Lund, N. Walk, and G. J. Pryde, Heralded noiseless linear amplification and distillation of entanglement, Nature Photonics, vol.450, issue.5, 2009.
DOI : 10.1038/nphoton.2010.35

A. C. Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982.
DOI : 10.1109/SFCS.1982.38

H. P. Yuen, Unconditionally secure quantum bit commitment is possible. Arxiv preprint quant-ph/0006109, 2000.

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Physical Review A, vol.79, issue.1, p.12307, 2009.
DOI : 10.1103/PhysRevA.79.012307