Device-Independent Security of Quantum Cryptography against Collective Attacks, Physical Review Letters, issue.23, p.98230501, 2007. ,
From Bell???s Theorem to Secure Quantum Key Distribution, Physical Review Letters, vol.97, issue.12, p.120405, 2006. ,
DOI : 10.1103/PhysRevLett.97.120405
Vector Fields on Spheres, The Annals of Mathematics, vol.75, issue.3, pp.603-632, 1962. ,
DOI : 10.2307/1970213
URL : http://dx.doi.org/10.1016/0040-9383(62)90096-4
Entanglement in continuous-variable systems: recent advances and current perspectives, Journal of Physics A: Mathematical and Theoretical, vol.40, issue.28, pp.7821-7880, 2007. ,
DOI : 10.1088/1751-8113/40/28/S01
Topological optimization of quantum key distribution networks, New Journal of Physics, vol.11, issue.7, 2009. ,
DOI : 10.1088/1367-2630/11/7/075002
The real symplectic groups in quantum mechanics and optics, Pramana, vol.70, issue.6, p.471, 1995. ,
DOI : 10.1007/BF02848172
Information Theoretically Secure Communication in the Limited Storage Space Model, Lecture Notes in Computer Science, pp.65-79, 1999. ,
DOI : 10.1007/3-540-48405-1_5
Quantum key distribution with continuous variables, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp.1903-1920, 1984. ,
DOI : 10.1364/OL.16.001234
Generalized privacy amplification. Information Theory, IEEE Transactions on, vol.41, issue.6, pp.1915-1923, 1995. ,
DOI : 10.1109/18.476316
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666
Quantum cryptography using any two nonorthogonal states, Physical Review Letters, vol.68, issue.21, pp.3121-3124, 1992. ,
DOI : 10.1103/PhysRevLett.68.3121
Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1, Proceedings of ICC '93, IEEE International Conference on Communications, 1993. ,
DOI : 10.1109/ICC.1993.397441
LDPC-based Gaussian key reconciliation, 2006 IEEE Information Theory Workshop, p.6, 2006. ,
DOI : 10.1109/ITW.2006.1633793
URL : https://hal.archives-ouvertes.fr/hal-00362753
Modewise entanglement of Gaussian states, Physical Review A, vol.67, issue.5, p.52311, 2003. ,
DOI : 10.1103/PhysRevA.67.052311
Is information the key?, Nature Physics, vol.5, issue.4, pp.2-4, 2005. ,
DOI : 10.1007/BF02058098
Minimum disclosure proofs of knowledge, Journal of Computer and System Sciences, vol.37, issue.2, pp.156-189, 1988. ,
DOI : 10.1016/0022-0000(88)90005-0
A quantum bit commitment scheme provably unbreakable by both parties, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, pp.362-371, 1993. ,
DOI : 10.1109/SFCS.1993.366851
Secret-Key Reconciliation by Public Discussion, Lecture Notes in Computer Science, vol.765, pp.410-423, 1994. ,
DOI : 10.1007/3-540-48285-7_35
Process Tomography of Field Damping and Measurement of Fock State Lifetimes by Quantum Nondemolition Photon Counting in a Cavity, Physical Review Letters, vol.101, issue.24, p.240402, 2008. ,
DOI : 10.1103/PhysRevLett.101.240402
URL : https://hal.archives-ouvertes.fr/hal-00319638
Finite-key analysis for practical implementations of quantum key distribution, New Journal of Physics, vol.11, issue.4, 2009. ,
Good quantum error-correcting codes exist, Physical Review A, vol.54, issue.2, pp.1098-1105, 1996. ,
DOI : 10.1103/PhysRevA.54.1098
URL : http://arxiv.org/abs/quant-ph/9512032
Unknown quantum states: The quantum de Finetti representation, Journal of Mathematical Physics, vol.43, issue.9, p.4537, 2002. ,
DOI : 10.1063/1.1494475
Negative Entropy and Information in Quantum Mechanics, Physical Review Letters, vol.79, issue.26, pp.5194-5197, 1997. ,
DOI : 10.1103/PhysRevLett.79.5194
Cloning of Continuous Quantum Variables, Physical Review Letters, vol.85, issue.8, pp.1754-1757, 2000. ,
DOI : 10.1103/PhysRevLett.85.1754
From quantum cloning to quantum key distribution with continuous variables: a review (Invited), Journal of the Optical Society of America B, vol.24, issue.2, pp.324-334, 2007. ,
DOI : 10.1364/JOSAB.24.000324
Quantum distribution of Gaussian keys using squeezed states, Physical Review A, vol.63, issue.5, p.52311, 2001. ,
DOI : 10.1103/PhysRevA.63.052311
Quantum state discrimination, Contemporary Physics, vol.41, issue.6, pp.401-424, 2000. ,
DOI : 10.1080/00107510010002599
A short impossibility proof of quantum bit commitment, Physics Letters A, vol.377, issue.15, 2009. ,
DOI : 10.1016/j.physleta.2013.02.045
One-and-a-Half Quantum de Finetti Theorems, Communications in Mathematical Physics, vol.90, issue.2, pp.473-498, 2007. ,
DOI : 10.1007/s00220-007-0189-3
URL : http://arxiv.org/abs/quant-ph/0602130
Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009. ,
DOI : 10.1103/PhysRevLett.102.020504
Characterizing quantum theory in terms of information-theoretic constraints, Foundations of Physics, vol.33, issue.11, pp.1561-1591, 2003. ,
DOI : 10.1023/A:1026056716397
Elements of information theory, 2006. ,
Cryptography in the bounded quantum-storage model, Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on, pp.449-458, 2005. ,
Reexamination of quantum bit commitment: The possible and the impossible, Physical Review A, vol.76, issue.3, p.32328, 2007. ,
Finite de Finetti Theorem for Infinite-Dimensional Systems, Physical Review Letters, issue.16, p.98160406, 2007. ,
La prévision: Ses lois logiques, ses sources subjectives Annales de l'institut Henri Poincaré (B) Probabilités et Statistiques [38] I. Devetak and A. Winter. Distillation of secret key and entanglement from quantum states, Proc. R. Soc. A, pp.1-68, 1937. ,
Finite Exchangeable Sequences. The Annals of Probability, pp.745-764, 1980. ,
DOI : 10.1214/aop/1176994663
URL : http://projecteuclid.org/download/pdf_1/euclid.aop/1176994663
A dozen de Finetti-style results in search of a theory ,
Introduction to the basics of entanglement theory in continuous-variable systems. Arxiv preprint quant-ph, 2003. ,
Distilling Gaussian states with Gaussian operations is impossible. Physical review letters, p.137903, 2002. ,
DOI : 10.1103/physrevlett.89.137903
Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991. ,
DOI : 10.1103/PhysRevLett.67.661
Efficient reconciliation protocol for discrete-variable quantum key distribution, 2009 IEEE International Symposium on Information Theory, pp.1879-1883, 2009. ,
DOI : 10.1109/ISIT.2009.5205475
"Relative State" Formulation of Quantum Mechanics, Reviews of Modern Physics, vol.29, issue.3, pp.454-462, 1957. ,
DOI : 10.1103/RevModPhys.29.454
Simulating physics with computers, International Journal of Theoretical Physics, vol.21, issue.6-7, pp.467-488, 1982. ,
DOI : 10.1007/BF02650179
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.45.9310
Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers, Journal of Physics B: Atomic, Molecular and Optical Physics, vol.42, issue.11, p.42114014, 2009. ,
DOI : 10.1088/0953-4075/42/11/114014
URL : https://hal.archives-ouvertes.fr/hal-00553544
Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, 2009. ,
DOI : 10.1088/1367-2630/11/4/045023
URL : https://hal.archives-ouvertes.fr/hal-00553585
Low-density parity-check codes, IEEE Transactions on Information Theory, vol.8, issue.1, 1963. ,
DOI : 10.1109/TIT.1962.1057683
Quantum information with optical continuous variables: from Bell tests to key distribution, 2007. ,
Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.97190503, 2006. ,
DOI : 10.1103/PhysRevLett.97.190503
Characterization of Gaussian operations and distillation of Gaussian states, Physical Review A, vol.66, issue.3, p.32316, 2002. ,
DOI : 10.1103/PhysRevA.66.032316
Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, pp.145-195, 2002. ,
DOI : 10.1103/RevModPhys.74.145
Coherent and Incoherent States of the Radiation Field, Physical Review, vol.131, issue.6, pp.2766-2788, 1963. ,
DOI : 10.1103/PhysRev.131.2766
Quantum jumps of light recording the birth and death of a photon in a cavity, Nature, vol.53, issue.7133, pp.446297-300, 2007. ,
DOI : 10.1038/nature05589
URL : https://hal.archives-ouvertes.fr/hal-00118324
The knowledge complexity of interactive proof-systems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, pp.291-304, 1985. ,
Proof of security of quantum key distribution with two-way classical communications, IEEE Transactions on Information Theory, vol.49, issue.2, pp.457-475, 2003. ,
DOI : 10.1109/TIT.2002.807289
Secure quantum key distribution using squeezed states, Physical Review A, vol.63, issue.2, p.22309, 2001. ,
DOI : 10.1103/PhysRevA.63.022309
URL : http://arxiv.org/abs/quant-ph/0008046
Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables, QUANTUM INFORMATION & COMPUTATIONSp. Iss. SI, vol.3, pp.535-552, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-00509120
Reverse reconciliation protocols for quantum cryptography with continuous variables. Arxiv preprint quant-ph/0204127, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-00509122
Quantum key distribution using Gaussian-modulated coherent states, Nature, issue.6920, pp.421238-241, 2003. ,
DOI : 10.1038/nature01289
URL : https://hal.archives-ouvertes.fr/hal-00509181
CollectiveAttacks and Unconditional Security in Continuous Variable Quantum KeyDistribution, Physical Review Letters, vol.94, issue.2, p.20504, 2005. ,
DOI : 10.1103/PhysRevLett.94.020504
Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks, Physical Review Letters, vol.92, issue.4, p.47905, 2004. ,
DOI : 10.1103/PhysRevLett.92.047905
URL : http://arxiv.org/abs/quant-ph/0311006
Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, p.57902, 2002. ,
DOI : 10.1103/PhysRevLett.88.057902
URL : https://hal.archives-ouvertes.fr/hal-00509124
Can quantum cryptography imply quantum mechanics? Reply to Smolin, QUANTUM INFORMATION & COMPUTATION, vol.5, issue.2, pp.170-175, 2005. ,
Superadditivity of communication capacity using entangled inputs, Nature Physics, vol.9, issue.4, pp.255-257, 2009. ,
DOI : 10.1103/PhysRevB.76.035114
Efficiency of coherent-state quantum cryptography in the presence of loss: Influence of realistic error correction, Physical Review A, vol.73, issue.5, p.52316, 2006. ,
DOI : 10.1103/PhysRevA.73.052316
Security of coherent-state quantum cryptography in the presence of Gaussian noise, Physical Review A, vol.76, issue.2, p.22313, 2007. ,
DOI : 10.1103/PhysRevA.76.022313
Quantum detection and estimation theory, Journal of Statistical Physics, vol.15, issue.1, pp.231-252, 1969. ,
DOI : 10.1007/BF01007479
Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000. ,
DOI : 10.1103/PhysRevA.61.022309
URL : http://arxiv.org/abs/quant-ph/9909006
Separability criterion and inseparable mixed states with positive partial transposition, Physics Letters A, vol.232, issue.5, pp.333-339, 1997. ,
DOI : 10.1016/S0375-9601(97)00416-7
URL : http://arxiv.org/abs/quant-ph/9703004
Locally normal symmetric states and an analogue of de Finetti's theorem. Probability Theory and Related Fields, pp.343-351, 1976. ,
Differential Phase Shift Quantum Key Distribution, Physical Review Letters, vol.89, issue.3, p.37902, 2002. ,
DOI : 10.1103/PhysRevLett.89.037902
Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, pp.620-630, 1957. ,
DOI : 10.1103/PhysRev.106.620
Unconditionally Secure Bit Commitment, Physical Review Letters, vol.83, issue.7, pp.1447-1450, 1999. ,
DOI : 10.1103/PhysRevLett.83.1447
URL : http://arxiv.org/abs/quant-ph/9810068
Founding crytpography on oblivious transfer, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.20-31, 1988. ,
DOI : 10.1145/62212.62215
Quantum computations: algorithms and error correction, Russian Mathematical Surveys, vol.52, issue.6, pp.1191-1249, 1997. ,
DOI : 10.1070/RM1997v052n06ABEH002155
On the Power of Quantum Memory, IEEE Transactions on Information Theory, vol.51, issue.7, pp.2391-2401, 2005. ,
DOI : 10.1109/TIT.2005.850087
A de Finetti representation for finite symmetric quantum states, Journal of Mathematical Physics, vol.46, issue.12, p.122108, 2005. ,
DOI : 10.1063/1.2146188
Sampling of Min-Entropy Relative to Quantum Knowledge, Workshop on Quantum Information Processing, 2007. ,
DOI : 10.1109/TIT.2011.2146730
The operational meaning of min-and maxentropy . arXiv, 2008. ,
On exchangeable continuous variable systems, Journal of Mathematical Physics, vol.50, issue.1, p.12102, 2009. ,
DOI : 10.1063/1.3043788
Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, p.95080501, 2005. ,
DOI : 10.1103/PhysRevLett.95.080501
A short introduction to quantum information and quantum computation, 2006. ,
DOI : 10.1017/CBO9780511755361
Measuring the quantum state of light, 1997. ,
Multidimensional reconciliation for continuous-variable quantum key distribution, IEEE International Symposium on Information Theory, pp.1020-1024, 2008. ,
DOI : 10.1109/isit.2008.4595141
URL : https://hal.archives-ouvertes.fr/hal-00316160
Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.11115009, 2009. ,
DOI : 10.1088/1367-2630/11/11/115009
URL : https://hal.archives-ouvertes.fr/hal-00554926
Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008. ,
DOI : 10.1103/PhysRevA.77.042325
Quantum de Finetti theorem in phase-space representation, Physical Review A, vol.80, issue.1, p.10102, 2009. ,
DOI : 10.1103/PhysRevA.80.010102
URL : http://arxiv.org/abs/0904.4862
Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009. ,
DOI : 10.1103/PhysRevLett.102.180504
URL : https://hal.archives-ouvertes.fr/hal-00459177
Optimal Quantum Measurements for Two Pure and Mixed States, Quantum Communications and Measurement: Proceedings of an International Workshop Held in Nottingham, p.439, 1994. ,
DOI : 10.1007/978-1-4899-1391-3_43
Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005. ,
DOI : 10.1103/PhysRevLett.94.230504
Is Quantum Bit Commitment Really Possible? Physical Review Letters, pp.3410-3413, 1997. ,
DOI : 10.1103/physrevlett.78.3410
URL : http://arxiv.org/abs/quant-ph/9603004
with an all-fiber continuous-variable system, Physical Review A, vol.76, issue.4, p.42305, 2007. ,
DOI : 10.1103/PhysRevA.76.042305
URL : http://arxiv.org/abs/0706.4255
Tight bound on the coherent-state quantum key distribution with heterodyne detection, Physical Review A, vol.76, issue.2, p.22332, 2007. ,
DOI : 10.1103/PhysRevA.76.022332
Continuous-variable optical quantum-state tomography, Reviews of Modern Physics, vol.81, issue.1, p.299, 2009. ,
DOI : 10.1103/RevModPhys.81.299
URL : http://arxiv.org/abs/quant-ph/0511044
Information theory, inference and learning algorithms, 2003. ,
Near Shannon limit performance of low density parity check codes, Electronics Letters, vol.33, issue.6, pp.457-458, 1997. ,
DOI : 10.1049/el:19970362
Strong No-Go Theorem for Gaussian Quantum Bit Commitment Arxiv preprint arXiv:0905, 2009. ,
DOI : 10.1103/physreva.81.010302
URL : http://arxiv.org/abs/0905.3419
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997. ,
DOI : 10.1103/PhysRevLett.78.3414
URL : http://arxiv.org/abs/quant-ph/9605044
Cours de statistique mathématique, Economica, 1997. ,
SecurityBounds for Continuous Variables Quantum Key Distribution, Physical Review Letters, vol.94, issue.2, p.20505, 2005. ,
DOI : 10.1103/PhysRevLett.94.020505
Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006. ,
DOI : 10.1103/PhysRevLett.97.190502
Statistical confidentiality tests for a quantum transmission using continuous variables, The European Physical Journal D - Atomic, Molecular and Optical Physics, vol.18, issue.2, pp.219-228, 2002. ,
DOI : 10.1140/epjd/e20020026
Side-information coding with turbo codes and its application to quantum key distribution, Proc. International Symposium on Information Theory and its Applications, 2004. ,
Quantum computation and quantum information, 2000. ,
No-Go Theorem for Gaussian Quantum Error Correction, Physical Review Letters, vol.102, issue.12, p.120501, 2009. ,
DOI : 10.1103/PhysRevLett.102.120501
URL : http://arxiv.org/abs/0811.3128
New Measurement of the Electron Magnetic Moment Using a One-Electron Quantum Cyclotron, Physical Review Letters, vol.97, issue.3, p.30801, 2006. ,
DOI : 10.1103/PhysRevLett.97.030801
Quantum entropy and its use, 2004. ,
DOI : 10.1007/978-3-642-57997-4
Generation of optical Schrödinger cats from photon number states, Nature, issue.7155, pp.448784-786, 2007. ,
Generating Optical Schrödinger kittens for quantum information processing, Science, issue.5770, pp.31283-86, 2006. ,
Quantum Homodyne Tomography of a Two-Photon Fock State, Physical Review Letters, vol.96, issue.21, p.96213601, 2006. ,
DOI : 10.1103/PhysRevLett.96.213601
URL : https://hal.archives-ouvertes.fr/hal-00509115
The SECOQC quantum key distribution network in Vienna, New Journal of Physics, vol.11, issue.7, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00559693
Separability Criterion for Density Matrices, Physical Review Letters, vol.77, issue.8, pp.1413-1415, 1996. ,
DOI : 10.1103/PhysRevLett.77.1413
Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, 2009. ,
DOI : 10.1088/1367-2630/11/4/045021
URL : http://doi.org/10.1088/1367-2630/11/4/045021
Entanglement and the foundations of statistical mechanics, Nature Physics, vol.188, issue.11, pp.754-758, 2006. ,
DOI : 10.1209/epl/i2005-10363-0
Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 1999. ,
DOI : 10.1103/PhysRevA.61.010303
URL : http://arxiv.org/abs/quant-ph/9907073
Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Physical Review A, vol.62, issue.6, p.62308, 2000. ,
DOI : 10.1103/PhysRevA.62.062308
Security of quantum key distribution. Arxiv preprint quant-ph, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00917115
Symmetry of large physical systems implies independence of subsystems, Nature Physics, vol.1, issue.9, pp.645-649, 2007. ,
DOI : 10.1038/nphys684
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, 2008. ,
DOI : 10.1103/PhysRevLett.102.110504
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009. ,
DOI : 10.1103/PhysRevLett.102.110504
Smooth renyi entropy and applications, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., p.233, 2004. ,
DOI : 10.1109/ISIT.2004.1365269
The Single-Serving Channel Capacity, 2006 IEEE International Symposium on Information Theory, pp.1424-1427, 2006. ,
DOI : 10.1109/ISIT.2006.262081
Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005. ,
DOI : 10.1103/PhysRevA.72.012332
URL : http://archive-ouverte.unige.ch/unige:36758
Multi-Edge Type LDPC Codes. Workshop honoring Prof. Bob McEliece on his 60th birthday, pp.24-25, 2002. ,
Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001. ,
DOI : 10.1109/18.910578
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Quantum physics: a first encounter: interference, entanglement, and reality, 2006. ,
The black paper of quantum cryptography: real implementation problems . Arxiv preprint 0906, 2005. ,
The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009. ,
DOI : 10.1103/RevModPhys.81.1301
Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing, Physical Review Letters, vol.100, issue.20, 2008. ,
DOI : 10.1103/PhysRevLett.100.200501
odinger. Der stetigeUbergang von der Mikro-zur Makromechanik, Naturwissenschaften, vol.14, issue.28, pp.664-666, 1926. ,
Quantum optics, 1997. ,
Multimode Uncertainty Relations and Separability of Continuous Variable States, Physical Review Letters, vol.96, issue.11, p.110402, 2006. ,
DOI : 10.1103/PhysRevLett.96.110402
A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994. ,
DOI : 10.1109/SFCS.1994.365700
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.3862
Quantum key distribution with bright entangled beams. Physical review letters, p.167902, 2002. ,
DOI : 10.1103/physrevlett.88.167902
URL : http://arxiv.org/abs/quant-ph/0109009
Continuous Variable Quantum Cryptography: Beating the 3 dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002. ,
Congruences and canonical forms for a positive matrix: Application to the Schweinler???Wigner extremum principle, Journal of Mathematical Physics, vol.40, issue.7, pp.3632-3642, 1999. ,
DOI : 10.1063/1.532913
) invariance, squeezing, and normal forms, Physical Review A, vol.49, issue.3, pp.1567-1583, 1994. ,
DOI : 10.1103/PhysRevA.49.1567
Quantum Communication with Zero-Capacity Channels, Science, vol.321, issue.5897, p.1812, 2008. ,
DOI : 10.1126/science.1162242
URL : http://arxiv.org/abs/0807.4935
Can quantum cryptography imply quantum mechanics?, QUANTUM INFORMATION & COMPUTATION, vol.5, issue.2, pp.161-169, 2005. ,
Evidence for the epistemic view of quantum states: A toy theory, Physical Review A, vol.75, issue.3, p.32110, 2007. ,
DOI : 10.1103/PhysRevA.75.032110
Fast and Simple Quantum Key Distribution Tight bounds on the eavesdropping of a continuous-variable quantum cryptographic protocol with no basis switching, Appl. Phys. Lett Physical Review A, vol.87, issue.5, p.76052301, 2005. ,
Discrimination of the binary coherent signal: Gaussian-operation limit and simple non-Gaussian near-optimal receivers, Physical Review A, vol.78, issue.2, p.22320, 2008. ,
DOI : 10.1103/PhysRevA.78.022320
Quantum cryptography and secret-key distillation, 2006. ,
DOI : 10.1017/CBO9780511617744
Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, pp.394-400, 2004. ,
DOI : 10.1109/TIT.2003.822618
Tomography increases key rates of quantum-key-distribution protocols, Physical Review A, vol.78, issue.4, p.42316, 2008. ,
DOI : 10.1103/PhysRevA.78.042316
Conjugate coding, ACM SIGACT News, vol.15, issue.1, pp.78-88, 1983. ,
DOI : 10.1145/1008908.1008920
On the Quantum Correction For Thermodynamic Equilibrium, Physical Review, vol.40, issue.5, pp.749-759, 1932. ,
DOI : 10.1103/PhysRev.40.749
The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975. ,
DOI : 10.1002/j.1538-7305.1975.tb02040.x
Heralded noiseless linear amplification and distillation of entanglement, Nature Photonics, vol.450, issue.5, 2009. ,
DOI : 10.1038/nphoton.2010.35
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982. ,
DOI : 10.1109/SFCS.1982.38
Unconditionally secure quantum bit commitment is possible. Arxiv preprint quant-ph/0006109, 2000. ,
Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks, Physical Review A, vol.79, issue.1, p.12307, 2009. ,
DOI : 10.1103/PhysRevA.79.012307