Long-distance continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.84, issue.6, p.62317, 2011. ,
DOI : 10.1103/PhysRevA.84.062317
URL : https://hal.archives-ouvertes.fr/hal-00663594
Field test of classical symmetric encryption with continuous variables quantum key distribution, Optics Express, vol.20, issue.13, p.14030, 2012. ,
DOI : 10.1364/OE.20.014030
Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012. ,
DOI : 10.1103/PhysRevA.86.032309
URL : https://hal.archives-ouvertes.fr/hal-00727095
Experimental demonstration of long-distance continuous-variable quantum key distribution, Nature Photonics, vol.109, issue.5, p.378, 2013. ,
DOI : 10.1038/nphoton.2013.63
URL : https://hal.archives-ouvertes.fr/hal-00798855
Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution, Physical Review A, vol.87, issue.6, p.62313, 2013. ,
DOI : 10.1103/PhysRevA.87.062313
URL : https://hal.archives-ouvertes.fr/hal-00841097
High Performance Error Correction for Quantum Key Distribution using Polar Codes, Quant. Inf. Comp, vol.14, issue.3&4, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00727093
Using Hash-Based Signatures to Bootstrap Quantum Key Distribution, Inf. Forens. Sec, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00663583
Experimental plug and play quantum coin flipping, Nature Communications, vol.7, 2013. ,
DOI : 10.1063/1.2432296
URL : https://hal.archives-ouvertes.fr/hal-01094106
Towards High-performance CVQKD " , FREQUENCY project meeting, 2011. ,
High Performance Continuous-Variable Quantum Key Distribution, 2011. ,
Performance and security of CVQKD, Continuous Variable Quantum Information Processing 2012, 2012. ,
Improving the Performance of Continuous-Variable Quantum Key Distribution: Study of Practical Imperfections and High-Performance Reconciliation, QCRYPT 2012, 2012. ,
Experimental demonstration of CVQKD over 80 km of standard telecoms fiber, 2012. ,
A new protocol and lower bounds for quantum coin flipping, Journal of Computer and System Sciences, vol.68, issue.2, pp.398-416, 2004. ,
DOI : 10.1016/j.jcss.2003.07.010
On a Low-Rate TLDPC Code Ensemble and the Necessary Condition on the Linear Minimum Distance for Sparse-Graph Codes, 1010. ,
URL : https://hal.archives-ouvertes.fr/hal-00671660
Channel polarization: A method for constructing capacityachieving code, Information Theory ISIT 2008. IEEE International Symposium on, pp.1173-1177, 2008. ,
Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp.175-179, 1984. ,
DOI : 10.1016/j.tcs.2014.05.025
Fair loss-tolerant quantum coin flipping, Physical Review A, vol.80, issue.6, p.62321, 2009. ,
DOI : 10.1103/PhysRevA.80.062321
Experimental loss-tolerant quantum coin flipping, Nature Communications, vol.84, p.561, 2011. ,
DOI : 10.1038/ncomms1572
The smooth entropy formalism for von Neumann algebras, Journal of Mathematical Physics, vol.57, issue.1, 2011. ,
DOI : 10.1063/1.4936405
Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier, Physical Review A, vol.86, issue.1, p.12327, 2012. ,
DOI : 10.1103/PhysRevA.86.012327
URL : https://hal.archives-ouvertes.fr/hal-00749512
Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes, p.509041, 2005. ,
Coin flipping by telephone a protocol for solving impossible problems, Advances in Cryptology; a Report on CRYPTO'81, pp.11-15, 1981. ,
DOI : 10.1145/1008908.1008911
Secret-key reconciliation by public discussion Quantum repeaters: The role of imperfect local operations in quantum communication, Phys. Rev. Lett, vol.17, issue.81, pp.410-4235932, 1994. ,
Quantum key distribution with bright entangled beams, Phys. Rev. Lett, vol.88, p.167902, 2002. ,
Optimal Quantum Strong Coin Flipping, 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 2009. ,
DOI : 10.1109/FOCS.2009.71
URL : http://arxiv.org/abs/0904.1511
List successive cancellation decoding of polar codes, Electronics Letters, vol.48, issue.9, pp.500-501, 2012. ,
DOI : 10.1049/el.2011.3334
A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution, New Journal of Physics, vol.13, issue.1, p.13003, 2011. ,
DOI : 10.1088/1367-2630/13/1/013003
Quantum information to the home, New Journal of Physics, vol.13, issue.6, p.63039, 2011. ,
DOI : 10.1088/1367-2630/13/6/063039
Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009. ,
DOI : 10.1103/PhysRevLett.102.020504
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light, Nature Communications, vol.74, p.2012, 1174. ,
DOI : 10.1038/ncomms2172
Elements of information theory, 1991. ,
Réconciliation et distillation publiques de secret, 1995. ,
Secure quantum key distribution using squeezed states, Phys. Rev. A, vol.63, p.22309, 2001. ,
A 24 km fiber-based discretely signaled continuous variable quantum key distribution system, Optics Express, vol.17, issue.26, pp.1724244-24249, 2009. ,
DOI : 10.1364/OE.17.024244
Continuous operation of high bit rate quantum key distribution, Applied Physics Letters, vol.96, issue.16, p.161102, 2010. ,
DOI : 10.1063/1.3385293
Continuous operation of high bit rate quantum key distribution, Applied Physics Letters, vol.96, issue.16, pp.161102-161102, 2010. ,
DOI : 10.1063/1.3385293
Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991. ,
DOI : 10.1103/PhysRevLett.67.661
Efficient reconciliation protocol for discrete-variable quantum key distribution, 2009 IEEE International Symposium on Information Theory, pp.1879-1883, 2009. ,
DOI : 10.1109/ISIT.2009.5205475
Rate compatible protocol for information reconciliation: An application to QKD, IEEE Information Theory Workshop 2010 (ITW 2010), 1006. ,
DOI : 10.1109/ITWKSPS.2010.5503195
Secure rate-adaptive reconciliation, 2010 International Symposium On Information Theory & Its Applications, pp.179-184, 2010. ,
DOI : 10.1109/ISITA.2010.5650099
URL : http://arxiv.org/abs/1007.0904
Untainted Puncturing for Irregular Low-Density Parity-Check Codes, IEEE Wireless Communications Letters, vol.1, issue.6, pp.585-588, 2012. ,
DOI : 10.1109/WCL.2012.082712.120531
Feasibility of free space quantum key distribution with coherent polarization states, New Journal of Physics, vol.11, issue.4, p.45014, 2009. ,
DOI : 10.1088/1367-2630/11/4/045014
Quantum key distribution and 1???Gbps data encryption over a single fibre, New Journal of Physics, vol.12, issue.6, p.63027, 2010. ,
DOI : 10.1088/1367-2630/12/6/063027
Calibration Attack and Defense in Continuous Variable Quantum Key Distribution, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference, 2007. ,
DOI : 10.1109/CLEOE-IQEC.2007.4386772
Continuous-variable quantum key distribution with noisy coherent states, Physical Review A, vol.77, issue.2, p.22310, 2008. ,
DOI : 10.1103/PhysRevA.77.022310
Gaussian postselection and virtual noiseless amplification in continuous-variable quantum key distribution, Physical Review A, vol.86, issue.6, pp.60302-2012 ,
DOI : 10.1103/PhysRevA.86.060302
Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009. ,
DOI : 10.1088/1367-2630/11/4/045023
URL : https://hal.archives-ouvertes.fr/hal-00553585
Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks, Physical Review Letters, vol.109, issue.10, p.100502, 2012. ,
DOI : 10.1103/PhysRevLett.109.100502
Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.97, 2006. ,
DOI : 10.1103/PhysRevLett.97.190503
Trojan-horse attacks on quantum-key-distribution systems, Physical Review A, vol.73, issue.2, p.22320, 2006. ,
DOI : 10.1103/PhysRevA.73.022320
Quantum digital signatures, 2001. ,
Quantum key distribution using gaussian-modulated coherent states, Nature, issue.6920, pp.421238-241, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-00509181
Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, p.57902, 2002. ,
DOI : 10.1103/PhysRevLett.88.057902
URL : https://hal.archives-ouvertes.fr/hal-00509124
Reverse reconciliation protocols for quantum cryptography with continuous variables, 2002. ,
URL : https://hal.archives-ouvertes.fr/hal-00509122
Polar coding to achieve the Holevo capacity of a pure-loss optical channel, 2012 IEEE International Symposium on Information Theory Proceedings, 1202. ,
DOI : 10.1109/ISIT.2012.6284250
Testing quantum devices: Practical entanglement verification in bipartite optical systems, Physical Review A, vol.77, issue.3, p.32303, 2008. ,
DOI : 10.1103/PhysRevA.77.032303
Security of coherent-state quantum cryptography in the presence of Gaussian noise, Physical Review A, vol.76, issue.2, p.22313, 2007. ,
DOI : 10.1103/PhysRevA.76.022313
Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000. ,
DOI : 10.1103/PhysRevA.61.022309
Quantum hacking on continuous-variable quantum key distribution system using a wavelength attack Arxiv preprint arXiv:1302, p.90, 2013. ,
A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys. CoRR, abs/1109, 2011. ,
Device Calibration Impacts Security of Quantum Key Distribution, Physical Review Letters, vol.107, issue.11, p.110501, 2011. ,
DOI : 10.1103/PhysRevLett.107.110501
The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, 1999. ,
DOI : 10.1007/s102070100002
High performance error correction for quantum key distribution using polar codes, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00727093
Field test of classical symmetric encryption with continuous variables quantum key distribution, Optics Express, vol.20, issue.13, pp.14030-14041, 2012. ,
DOI : 10.1364/OE.20.014030
Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution, Physical Review A, vol.87, issue.6, p.62313, 2013. ,
DOI : 10.1103/PhysRevA.87.062313
URL : https://hal.archives-ouvertes.fr/hal-00841097
Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012. ,
DOI : 10.1103/PhysRevA.86.032309
URL : https://hal.archives-ouvertes.fr/hal-00727095
Experimental demonstration of long-distance continuous-variable quantum key distribution, Nature Photonics, vol.109, issue.5, 2013. ,
DOI : 10.1038/nphoton.2013.63
URL : https://hal.archives-ouvertes.fr/hal-00798855
Long-distance continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.84, issue.6, p.62317, 2011. ,
DOI : 10.1103/PhysRevA.84.062317
URL : https://hal.archives-ouvertes.fr/hal-00663594
Quantum key distribution with continuous variables, J. Mod. Opt, vol.48, 1903. ,
An empirical scaling law for polar codes, 2010 IEEE International Symposium on Information Theory, pp.884-888, 2010. ,
DOI : 10.1109/ISIT.2010.5513579
Using Hash-Based Signatures to Bootstrap Quantum Key Distribution, 1109. ,
URL : https://hal.archives-ouvertes.fr/hal-00663583
No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light, Physical Review Letters, vol.95, issue.18, p.180503, 2005. ,
DOI : 10.1103/PhysRevLett.95.180503
Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008. ,
DOI : 10.1103/PhysRevA.77.042325
Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009. ,
DOI : 10.1103/PhysRevLett.102.180504
URL : https://hal.archives-ouvertes.fr/hal-00459177
Continuous-variable Quantum Key Distribution protocols with a discrete modulation. arxiv preprint:1002, 2010. ,
Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.115009, 2009. ,
DOI : 10.1088/1367-2630/11/11/115009
URL : https://hal.archives-ouvertes.fr/hal-00554926
Security of Continuous-Variable Quantum Key Distribution Against General Attacks, Physical Review Letters, vol.110, issue.3, p.30502, 2013. ,
DOI : 10.1103/PhysRevLett.110.030502
URL : https://hal.archives-ouvertes.fr/hal-00917115
Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.81, issue.6, p.62314, 2010. ,
DOI : 10.1103/PhysRevA.81.062314
URL : https://hal.archives-ouvertes.fr/hal-00553558
Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation, Physical Review A, vol.83, issue.4, p.42312, 2011. ,
DOI : 10.1103/PhysRevA.83.042312
URL : https://hal.archives-ouvertes.fr/hal-00624775
Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A, vol.81, issue.6, p.62343, 2010. ,
DOI : 10.1103/PhysRevA.81.062343
URL : https://hal.archives-ouvertes.fr/hal-00553554
Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A, vol.81, issue.6, p.62343, 2010. ,
DOI : 10.1103/PhysRevA.81.062343
URL : https://hal.archives-ouvertes.fr/hal-00553554
An Adaptive Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check, IEEE Communications Letters, vol.16, issue.12, pp.162044-2047, 2012. ,
DOI : 10.1109/LCOMM.2012.111612.121898
Attacking a practical quantum-key-distribution system with wavelength-dependent beamsplitter and multiwavelength sources Why quantum bit commitment and ideal quantum coin tossing are impossible, Phys. Rev. A Physica D, vol.84, issue.120, pp.62308177-187, 1998. ,
Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum-Key-Distribution System, Physical Review Letters, vol.98, issue.3, p.30503, 2007. ,
DOI : 10.1103/PhysRevLett.98.030503
URL : https://hal.archives-ouvertes.fr/hal-00509168
Quantum key distribution over 25 km with an all-fiber continuous-variable system, Phys. Rev. A, vol.76, issue.4, 2007. ,
Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005. ,
DOI : 10.1103/PhysRevA.72.050303
Witnessing effective entanglement in a continuous variable prepare-and-measure setup and application to a quantum key distribution scheme using postselection, Physical Review A, vol.74, issue.4, p.42326, 2006. ,
DOI : 10.1103/PhysRevA.74.042326
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010. ,
DOI : 10.1038/nphoton.2010.214
Improved wavelength attack on practical continuous variables quantum key distribution system with heterodyne protocol. Arxiv preprint arXiv:1303, 2013. ,
Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum key distribution system. Arxiv preprint arXiv:1303, p.6043, 2013. ,
Information Theory, Inference and Learning Algorithms, 2003. ,
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes, IEEE Transactions on Information Theory, vol.57, issue.10, pp.6428-6443, 2011. ,
DOI : 10.1109/TIT.2011.2162275
Controlling passively quenched single photon detectors by bright light, New Journal of Physics, vol.11, issue.6, p.65003, 2009. ,
DOI : 10.1088/1367-2630/11/6/065003
Performance and construction of polar codes on symmetric binary-input memoryless channels, 2009 IEEE International Symposium on Information Theory, pp.1496-1500, 2009. ,
DOI : 10.1109/ISIT.2009.5205857
Interactive reconciliation with low-density parity-check codes, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing, pp.270-274, 2010. ,
DOI : 10.1109/ISTC.2010.5613856
Blind reconciliation, Quant. Inf. Comp, vol.12, pp.9-10791, 2012. ,
Linear Cryptanalysis Method for DES Cipher, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.386-397, 1994. ,
DOI : 10.1007/3-540-48285-7_33
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997. ,
DOI : 10.1103/PhysRevLett.78.3414
Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes, 2010 IEEE Information Theory Workshop, 2010. ,
DOI : 10.1109/CIG.2010.5592755
Practical Limitation for Continuous-Variable Quantum Cryptography using Coherent States, Physical Review Letters, vol.92, issue.11, p.117901, 2004. ,
DOI : 10.1103/PhysRevLett.92.117901
Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006. ,
DOI : 10.1103/PhysRevLett.97.190502
Quantum distribution of gaussian keys using squeezed states, Phys. Rev. A, vol.63, p.52311, 2001. ,
A new proof of the channel coding theorem via hypothesis testing in quantum information theory, Proceedings IEEE International Symposium on Information Theory,, p.73, 2002. ,
DOI : 10.1109/ISIT.2002.1023345
Experimental plug & play quantum coin flipping Arxiv preprint arXiv:1306, 2013. ,
Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber, Physical Review X, vol.2, issue.4, p.41010, 2012. ,
DOI : 10.1103/PhysRevX.2.041010
The secoqc quantum key distribution network in vienna, New J. Phys, vol.11, p.75001, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00559693
Dense wavelength multiplexing of 1550???nm QKD with strong classical channels in reconfigurable networking environments, New Journal of Physics, vol.11, issue.4, p.45012, 2009. ,
DOI : 10.1088/1367-2630/11/4/045012
Feasibility of quantum key distribution through a dense wavelength division multiplexing network Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers, New J. Phys. Phys. Rev. A, vol.12, issue.76, p.103042052323, 2007. ,
Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 2000. ,
DOI : 10.1103/PhysRevA.61.010303
Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Physical Review A, vol.62, issue.6, p.10303, 2000. ,
DOI : 10.1103/PhysRevA.62.062308
Efficient Polar Coding of Quantum Information, Physical Review Letters, vol.109, issue.5, p.50504, 2012. ,
DOI : 10.1103/PhysRevLett.109.050504
SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.06, issue.01, 2005. ,
DOI : 10.1142/S0219749908003256
URL : https://hal.archives-ouvertes.fr/hal-00917115
de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009. ,
DOI : 10.1103/PhysRevLett.102.110504
URL : http://arxiv.org/abs/0809.2243
Multi-edge type LDPC codes. presented at the Workshop honoring Prof. Bob McEliece on his 60th birthday , California Institute of Technology, 2002. ,
Modern Coding Theory, 2008. ,
DOI : 10.1017/CBO9780511791338
Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001. ,
DOI : 10.1109/18.910578
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Practical long-distance quantum key distribution system using decoy levels, New Journal of Physics, vol.11, issue.4, p.45009, 2009. ,
DOI : 10.1088/1367-2630/11/4/045009
A practical protocol for advantage distillation and information reconciliation, Des. Codes Cryptography, vol.30, issue.1, pp.39-62, 2003. ,
Field test of quantum key distribution in the tokyo qkd network, Opt. Express, vol.19, pp.10387-10409, 2011. ,
The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009. ,
DOI : 10.1103/RevModPhys.81.1301
The black paper of quantum cryptography: real implementation problems Arxiv preprint arXiv:0906, pp.4547-4549 ,
Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing, Physical Review Letters, vol.100, issue.20, 2008. ,
DOI : 10.1103/PhysRevLett.100.200501
Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144??km, Physical Review Letters, vol.98, issue.1, p.10504, 2007. ,
DOI : 10.1103/PhysRevLett.98.010504
Efficient Identification and Signatures for Smart Cards, Advances in Cryptology ? Crypto'89, pp.239-252, 1990. ,
A mathematical theory of communication. The Bell System Technical Journal, pp.379-423, 1948. ,
Experimental study on discretely modulated continuous-variable quantum key distribution, Physical Review A, vol.82, issue.2, p.22317, 2010. ,
DOI : 10.1103/PhysRevA.82.022317
Continuous-variable quantum key distribution with Gaussian source noise, Physical Review A, vol.83, issue.5, p.52304, 2011. ,
DOI : 10.1103/PhysRevA.83.052304
URL : http://arxiv.org/abs/1101.0871
Design of Efficient Erasure Codes with Differential Evolution, Proceedings of the 2000 IEEE international conference on Symposium on Information Theory, 2000. ,
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997. ,
DOI : 10.1137/S0097539795293172
Continuous Variable Quantum Cryptography: Beating the 3??dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002. ,
DOI : 10.1103/PhysRevLett.89.167901
Quantum protocol for cheatsensitive weak coin flipping, Phys. Rev. Lett, vol.89, issue.22, pp.1-4, 2002. ,
Long-term performance of the SwissQuantum quantum key distribution network in a field environment, New Journal of Physics, vol.13, issue.12, p.123001, 2011. ,
DOI : 10.1088/1367-2630/13/12/123001
High rate, long-distance quantum key distribution over 250???km of ultra low loss fibres, New Journal of Physics, vol.11, issue.7, p.75003, 2009. ,
DOI : 10.1088/1367-2630/11/7/075003
A study on secret key reconciliation protocol, IEICE Trans. Fundamentals, issue.10, pp.1987-1991, 2000. ,
Coherent State Quantum Key Distribution with Continuous-Wave Laser Beams, Optical Fiber Communication Conference, p.6, 2010. ,
DOI : 10.1364/OFC.2010.OWC6
URL : http://espace.library.uq.edu.au/view/UQ:316275/UQ316275.pdf
Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise, Physical Review A, vol.76, issue.3, p.30303, 2007. ,
DOI : 10.1103/PhysRevA.76.030303
Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors, Nature Photonics, vol.8, issue.6, pp.343-348, 2007. ,
DOI : 10.1038/nphoton.2007.75
List decoding of polar codes, IEEE International Symposium on Information Theory, pp.1-5, 2011. ,
Free-space continuous-variable Quantum Cryptography, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference, 2007. ,
DOI : 10.1109/CLEOE-IQEC.2007.4386790
Entanglement-based quantum communication over 144???km, Nature Physics, vol.39, issue.7, pp.481-486, 2007. ,
DOI : 10.1103/PhysRevA.64.010102
URL : http://hdl.handle.net/11858/00-001M-0000-000F-B797-1
Feasibility of continuousvariable quantum key distribution with noisy coherent states, Phys. Rev. A, vol.81, p.22318, 2010. ,
Quantum Cryptography and Secret-Key Distillation, 2006. ,
DOI : 10.1017/CBO9780511617744
Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, p.394, 2004. ,
DOI : 10.1109/TIT.2003.822618
Security of continuous-variable quantum cryptography with Gaussian postselection, Physical Review A, vol.87, issue.2, 2012. ,
DOI : 10.1103/PhysRevA.87.020303
Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, p.170504, 2004. ,
DOI : 10.1103/PhysRevLett.93.170504
URL : http://arxiv.org/abs/quant-ph/0405105
Quantum Cryptography Approaching the Classical Limit, Physical Review Letters, vol.105, issue.11, p.110501, 2010. ,
DOI : 10.1103/PhysRevLett.105.110501
Continuous-variable quantum key distribution using thermal states, Physical Review A, vol.86, issue.2, p.22318, 2012. ,
DOI : 10.1103/PhysRevA.86.022318
URL : http://arxiv.org/abs/1110.4617
Gaussian quantum information, Reviews of Modern Physics, vol.84, issue.2, pp.621-669, 2012. ,
DOI : 10.1103/RevModPhys.84.621
New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981. ,
DOI : 10.1016/0022-0000(81)90033-7
New classes and applications of hash functions, FOCS, pp.175-182, 1979. ,
Polar Codes for Classical-Quantum Channels, IEEE Transactions on Information Theory, vol.59, issue.2, pp.1175-1187, 2013. ,
DOI : 10.1109/TIT.2012.2218792
Coding theorem and strong converse for quantum channels, IEEE Transactions on Information Theory, vol.45, issue.7, pp.2481-2485, 1999. ,
DOI : 10.1109/18.796385
Extremality of Gaussian Quantum States, Physical Review Letters, vol.96, issue.8, p.80502, 2006. ,
DOI : 10.1103/PhysRevLett.96.080502
Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A, vol.67, p.52303, 2003. ,
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010. ,
DOI : 10.1088/1367-2630/12/11/113026
Experimental implementation of bit commitment in the noisy-storage model, Nature Communications, vol.75, p.2012, 1326. ,
DOI : 10.1038/ncomms2268
Reduced-latency SC polar decoder architectures, 2012 IEEE International Conference on Communications (ICC), 2012. ,
DOI : 10.1109/ICC.2012.6364209
URL : http://arxiv.org/abs/1111.0704
Computational Complexity of Continuous Variable Quantum Key Distribution, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2803-2807, 2008. ,
DOI : 10.1109/TIT.2008.921889
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008. ,
DOI : 10.1103/PhysRevA.78.042333