?. P. Jouguet, S. Kunz-jacques, and A. Leverrier, Long-distance continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.84, issue.6, p.62317, 2011.
DOI : 10.1103/PhysRevA.84.062317

URL : https://hal.archives-ouvertes.fr/hal-00663594

?. P. Jouguet, S. Kunz-jacques, T. Debuisschert, S. Fossier, E. Diamanti et al., Field test of classical symmetric encryption with continuous variables quantum key distribution, Optics Express, vol.20, issue.13, p.14030, 2012.
DOI : 10.1364/OE.20.014030

?. P. Jouguet, S. Kunz-jacques, E. Diamanti, and A. Leverrier, Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012.
DOI : 10.1103/PhysRevA.86.032309

URL : https://hal.archives-ouvertes.fr/hal-00727095

?. P. Jouguet, S. Kunz-jacques, A. Leverrier, P. Grangier, and E. Diamanti, Experimental demonstration of long-distance continuous-variable quantum key distribution, Nature Photonics, vol.109, issue.5, p.378, 2013.
DOI : 10.1038/nphoton.2013.63

URL : https://hal.archives-ouvertes.fr/hal-00798855

?. P. Jouguet, S. Kunz-jacques, and E. Diamanti, Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution, Physical Review A, vol.87, issue.6, p.62313, 2013.
DOI : 10.1103/PhysRevA.87.062313

URL : https://hal.archives-ouvertes.fr/hal-00841097

?. P. Jouguet and S. Kunz-jacques, High Performance Error Correction for Quantum Key Distribution using Polar Codes, Quant. Inf. Comp, vol.14, issue.3&4, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00727093

?. S. Kunz-jacques and P. Jouguet, Using Hash-Based Signatures to Bootstrap Quantum Key Distribution, Inf. Forens. Sec, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00663583

?. A. Pappa, P. Jouguet, T. Lawson, A. Chailloux, M. Legré et al., Experimental plug and play quantum coin flipping, Nature Communications, vol.7, 2013.
DOI : 10.1063/1.2432296

URL : https://hal.archives-ouvertes.fr/hal-01094106

?. P. Jouguet, Towards High-performance CVQKD " , FREQUENCY project meeting, 2011.

?. P. Jouguet, S. Kunz-jacques, A. Leverrier, and E. Diamanti, High Performance Continuous-Variable Quantum Key Distribution, 2011.

?. P. Jouguet, Performance and security of CVQKD, Continuous Variable Quantum Information Processing 2012, 2012.

?. P. Jouguet, S. Kunz-jacques, A. Leverrier, and E. Diamanti, Improving the Performance of Continuous-Variable Quantum Key Distribution: Study of Practical Imperfections and High-Performance Reconciliation, QCRYPT 2012, 2012.

?. P. Jouguet, S. Kunz-jacques, A. Leverrier, P. Grangier, and E. Diamanti, Experimental demonstration of CVQKD over 80 km of standard telecoms fiber, 2012.

A. Ambainis, A new protocol and lower bounds for quantum coin flipping, Journal of Computer and System Sciences, vol.68, issue.2, pp.398-416, 2004.
DOI : 10.1016/j.jcss.2003.07.010

I. Andriyanova and J. P. Tillich, On a Low-Rate TLDPC Code Ensemble and the Necessary Condition on the Linear Minimum Distance for Sparse-Graph Codes, 1010.
URL : https://hal.archives-ouvertes.fr/hal-00671660

E. Arikan, Channel polarization: A method for constructing capacityachieving code, Information Theory ISIT 2008. IEEE International Symposium on, pp.1173-1177, 2008.

C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp.175-179, 1984.
DOI : 10.1016/j.tcs.2014.05.025

G. Berlin and G. Brassard, Fair loss-tolerant quantum coin flipping, Physical Review A, vol.80, issue.6, p.62321, 2009.
DOI : 10.1103/PhysRevA.80.062321

G. Berlin, G. Brassard, N. Felixbussì-eres, J. Godbout, W. Slater et al., Experimental loss-tolerant quantum coin flipping, Nature Communications, vol.84, p.561, 2011.
DOI : 10.1038/ncomms1572

M. Berta, F. Furrer, and V. B. Scholz, The smooth entropy formalism for von Neumann algebras, Journal of Mathematical Physics, vol.57, issue.1, 2011.
DOI : 10.1063/1.4936405

R. Blandino, A. Leverrier, M. Barbieri, J. Etesse, P. Grangier et al., Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier, Physical Review A, vol.86, issue.1, p.12327, 2012.
DOI : 10.1103/PhysRevA.86.012327

URL : https://hal.archives-ouvertes.fr/hal-00749512

M. Bloch, A. Thangaraj, and S. W. Mclaughlin, Efficient Reconciliation of Correlated Continuous Random Variables using LDPC Codes, p.509041, 2005.

M. Blum, Coin flipping by telephone a protocol for solving impossible problems, Advances in Cryptology; a Report on CRYPTO'81, pp.11-15, 1981.
DOI : 10.1145/1008908.1008911

G. Brassard, L. Briegel, W. Dür, J. I. Cirac, and P. Zoller, Secret-key reconciliation by public discussion Quantum repeaters: The role of imperfect local operations in quantum communication, Phys. Rev. Lett, vol.17, issue.81, pp.410-4235932, 1994.

G. , L. Ch, N. Silberhorn, and . Korolkova, Quantum key distribution with bright entangled beams, Phys. Rev. Lett, vol.88, p.167902, 2002.

A. Chailloux and I. Kerenidis, Optimal Quantum Strong Coin Flipping, 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 2009.
DOI : 10.1109/FOCS.2009.71

URL : http://arxiv.org/abs/0904.1511

K. Chen, K. Niu, and J. R. Lin, List successive cancellation decoding of polar codes, Electronics Letters, vol.48, issue.9, pp.500-501, 2012.
DOI : 10.1049/el.2011.3334

Y. Chi, B. Qi, W. Zhu, L. Qian, H. Lo et al., A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution, New Journal of Physics, vol.13, issue.1, p.13003, 2011.
DOI : 10.1088/1367-2630/13/1/013003

I. Choi, J. Robert, . Young, D. Paul, and . Townsend, Quantum information to the home, New Journal of Physics, vol.13, issue.6, p.63039, 2011.
DOI : 10.1088/1367-2630/13/6/063039

M. Christandl, R. König, and R. Renner, Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009.
DOI : 10.1103/PhysRevLett.102.020504

R. J. Clarke, P. J. Collins, V. Dunjko, E. Andersson, J. Jeffers et al., Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light, Nature Communications, vol.74, p.2012, 1174.
DOI : 10.1038/ncomms2172

M. Thomas, J. A. Cover, and . Thomas, Elements of information theory, 1991.

C. Crépeau, Réconciliation et distillation publiques de secret, 1995.

J. Preskill and D. Gottesman, Secure quantum key distribution using squeezed states, Phys. Rev. A, vol.63, p.22309, 2001.

Q. Dinh-xuan, Z. Zhang, and P. L. Voss, A 24 km fiber-based discretely signaled continuous variable quantum key distribution system, Optics Express, vol.17, issue.26, pp.1724244-24249, 2009.
DOI : 10.1364/OE.17.024244

A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, Continuous operation of high bit rate quantum key distribution, Applied Physics Letters, vol.96, issue.16, p.161102, 2010.
DOI : 10.1063/1.3385293

A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, Continuous operation of high bit rate quantum key distribution, Applied Physics Letters, vol.96, issue.16, pp.161102-161102, 2010.
DOI : 10.1063/1.3385293

A. K. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991.
DOI : 10.1103/PhysRevLett.67.661

D. Elkouss, A. Leverrier, R. Alléaume, and J. Boutros, Efficient reconciliation protocol for discrete-variable quantum key distribution, 2009 IEEE International Symposium on Information Theory, pp.1879-1883, 2009.
DOI : 10.1109/ISIT.2009.5205475

D. Elkouss, J. Martínez-mateo, D. Lancho, and V. Martin, Rate compatible protocol for information reconciliation: An application to QKD, IEEE Information Theory Workshop 2010 (ITW 2010), 1006.
DOI : 10.1109/ITWKSPS.2010.5503195

D. Elkouss, J. Martinez-mateo, and V. Martin, Secure rate-adaptive reconciliation, 2010 International Symposium On Information Theory & Its Applications, pp.179-184, 2010.
DOI : 10.1109/ISITA.2010.5650099

URL : http://arxiv.org/abs/1007.0904

D. Elkouss, J. Martínez-mateo, and V. Martin, Untainted Puncturing for Irregular Low-Density Parity-Check Codes, IEEE Wireless Communications Letters, vol.1, issue.6, pp.585-588, 2012.
DOI : 10.1109/WCL.2012.082712.120531

D. Elser, . Bartley, C. Heim, . Wittmann, G. Sych et al., Feasibility of free space quantum key distribution with coherent polarization states, New Journal of Physics, vol.11, issue.4, p.45014, 2009.
DOI : 10.1088/1367-2630/11/4/045014

P. Eraerds, N. Walenta, M. Legre, N. Gisin, and H. Zbinden, Quantum key distribution and 1???Gbps data encryption over a single fibre, New Journal of Physics, vol.12, issue.6, p.63027, 2010.
DOI : 10.1088/1367-2630/12/6/063027

A. Ferenczi, P. Grangier, and F. Grosshans, Calibration Attack and Defense in Continuous Variable Quantum Key Distribution, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference, 2007.
DOI : 10.1109/CLEOE-IQEC.2007.4386772

R. Filip, Continuous-variable quantum key distribution with noisy coherent states, Physical Review A, vol.77, issue.2, p.22310, 2008.
DOI : 10.1103/PhysRevA.77.022310

J. Fiurasek and N. J. Cerf, Gaussian postselection and virtual noiseless amplification in continuous-variable quantum key distribution, Physical Review A, vol.86, issue.6, pp.60302-2012
DOI : 10.1103/PhysRevA.86.060302

S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-brouri et al., Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009.
DOI : 10.1088/1367-2630/11/4/045023

URL : https://hal.archives-ouvertes.fr/hal-00553585

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz et al., Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks, Physical Review Letters, vol.109, issue.10, p.100502, 2012.
DOI : 10.1103/PhysRevLett.109.100502

R. Garcia-patron and N. J. Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, p.97, 2006.
DOI : 10.1103/PhysRevLett.97.190503

N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems, Physical Review A, vol.73, issue.2, p.22320, 2006.
DOI : 10.1103/PhysRevA.73.022320

D. Gottesman and I. L. Chuang, Quantum digital signatures, 2001.

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. J. Cerf et al., Quantum key distribution using gaussian-modulated coherent states, Nature, issue.6920, pp.421238-241, 2003.
URL : https://hal.archives-ouvertes.fr/hal-00509181

F. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, p.57902, 2002.
DOI : 10.1103/PhysRevLett.88.057902

URL : https://hal.archives-ouvertes.fr/hal-00509124

F. Grosshans and P. Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00509122

S. Guha and M. M. Wilde, Polar coding to achieve the Holevo capacity of a pure-loss optical channel, 2012 IEEE International Symposium on Information Theory Proceedings, 1202.
DOI : 10.1109/ISIT.2012.6284250

H. Häseler, T. Moroder, and N. Lütkenhaus, Testing quantum devices: Practical entanglement verification in bipartite optical systems, Physical Review A, vol.77, issue.3, p.32303, 2008.
DOI : 10.1103/PhysRevA.77.032303

M. Heid and N. Lütkenhaus, Security of coherent-state quantum cryptography in the presence of Gaussian noise, Physical Review A, vol.76, issue.2, p.22313, 2007.
DOI : 10.1103/PhysRevA.76.022313

M. Hillery, Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, p.22309, 2000.
DOI : 10.1103/PhysRevA.61.022309

J. Huang, C. Weedbrook, S. Zhen-qiang-yin, H. Wang, W. Li et al., Quantum hacking on continuous-variable quantum key distribution system using a wavelength attack Arxiv preprint arXiv:1302, p.90, 2013.

L. M. Ioannou and M. Mosca, A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys. CoRR, abs/1109, 2011.

N. Jain, C. Wittmann, L. Lydersen, C. Wiechers, D. Elser et al., Device Calibration Impacts Security of Quantum Key Distribution, Physical Review Letters, vol.107, issue.11, p.110501, 2011.
DOI : 10.1103/PhysRevLett.107.110501

D. Johnson and A. Menezes, The Elliptic Curve Digital Signature Algorithm (ECDSA), International Journal of Information Security, vol.1, issue.1, 1999.
DOI : 10.1007/s102070100002

P. Jouguet and S. Kunz-jacques, High performance error correction for quantum key distribution using polar codes, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00727093

P. Jouguet, S. Kunz-jacques, T. Debuisschert, S. Fossier, E. Diamanti et al., Field test of classical symmetric encryption with continuous variables quantum key distribution, Optics Express, vol.20, issue.13, pp.14030-14041, 2012.
DOI : 10.1364/OE.20.014030

P. Jouguet, S. Kunz-jacques, and E. Diamanti, Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution, Physical Review A, vol.87, issue.6, p.62313, 2013.
DOI : 10.1103/PhysRevA.87.062313

URL : https://hal.archives-ouvertes.fr/hal-00841097

P. Jouguet, S. Kunz-jacques, E. Diamanti, and A. Leverrier, Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012.
DOI : 10.1103/PhysRevA.86.032309

URL : https://hal.archives-ouvertes.fr/hal-00727095

P. Jouguet, S. Kunz-jacques, A. Leverrier, P. Grangier, and E. Diamanti, Experimental demonstration of long-distance continuous-variable quantum key distribution, Nature Photonics, vol.109, issue.5, 2013.
DOI : 10.1038/nphoton.2013.63

URL : https://hal.archives-ouvertes.fr/hal-00798855

P. Jouguet, S. Kunz-jacques, and A. Leverrier, Long-distance continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.84, issue.6, p.62317, 2011.
DOI : 10.1103/PhysRevA.84.062317

URL : https://hal.archives-ouvertes.fr/hal-00663594

A. Jankovic, K. Bencheikh, T. Symul, and J. A. Levenson, Quantum key distribution with continuous variables, J. Mod. Opt, vol.48, 1903.

S. B. Korada, A. Montanari, I. E. Telatar, and R. Urbanke, An empirical scaling law for polar codes, 2010 IEEE International Symposium on Information Theory, pp.884-888, 2010.
DOI : 10.1109/ISIT.2010.5513579

S. Kunz-jacques and P. Jouguet, Using Hash-Based Signatures to Bootstrap Quantum Key Distribution, 1109.
URL : https://hal.archives-ouvertes.fr/hal-00663583

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph et al., No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light, Physical Review Letters, vol.95, issue.18, p.180503, 2005.
DOI : 10.1103/PhysRevLett.95.180503

A. Leverrier, R. Alléaume, J. Boutros, G. Zémor, and P. Grangier, Multidimensional reconciliation for a continuous-variable quantum key distribution, Physical Review A, vol.77, issue.4, p.42325, 2008.
DOI : 10.1103/PhysRevA.77.042325

A. Leverrier and P. Grangier, Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation, Physical Review Letters, vol.102, issue.18, p.180504, 2009.
DOI : 10.1103/PhysRevLett.102.180504

URL : https://hal.archives-ouvertes.fr/hal-00459177

A. Leverrier and P. Grangier, Continuous-variable Quantum Key Distribution protocols with a discrete modulation. arxiv preprint:1002, 2010.

A. Leverrier, E. Karpov, P. Grangier, and N. Cerf, Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New Journal of Physics, vol.11, issue.11, p.115009, 2009.
DOI : 10.1088/1367-2630/11/11/115009

URL : https://hal.archives-ouvertes.fr/hal-00554926

A. Leverrier, R. García-patrón, R. Renner, and N. J. Cerf, Security of Continuous-Variable Quantum Key Distribution Against General Attacks, Physical Review Letters, vol.110, issue.3, p.30502, 2013.
DOI : 10.1103/PhysRevLett.110.030502

URL : https://hal.archives-ouvertes.fr/hal-00917115

A. Leverrier and P. Grangier, Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation, Physical Review A, vol.81, issue.6, p.62314, 2010.
DOI : 10.1103/PhysRevA.81.062314

URL : https://hal.archives-ouvertes.fr/hal-00553558

A. Leverrier and P. Grangier, Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation, Physical Review A, vol.83, issue.4, p.42312, 2011.
DOI : 10.1103/PhysRevA.83.042312

URL : https://hal.archives-ouvertes.fr/hal-00624775

A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A, vol.81, issue.6, p.62343, 2010.
DOI : 10.1103/PhysRevA.81.062343

URL : https://hal.archives-ouvertes.fr/hal-00553554

A. Leverrier, F. Grosshans, and P. Grangier, Finite-size analysis of a continuous-variable quantum key distribution, Physical Review A, vol.81, issue.6, p.62343, 2010.
DOI : 10.1103/PhysRevA.81.062343

URL : https://hal.archives-ouvertes.fr/hal-00553554

B. Li, H. Shen, and D. Tse, An Adaptive Successive Cancellation List Decoder for Polar Codes with Cyclic Redundancy Check, IEEE Communications Letters, vol.16, issue.12, pp.162044-2047, 2012.
DOI : 10.1109/LCOMM.2012.111612.121898

H. Li, S. Wang, J. Huang, W. Chen, F. Zhen-qiang-yin et al., Attacking a practical quantum-key-distribution system with wavelength-dependent beamsplitter and multiwavelength sources Why quantum bit commitment and ideal quantum coin tossing are impossible, Phys. Rev. A Physica D, vol.84, issue.120, pp.62308177-187, 1998.

J. Lodewyck, T. Debuisschert, R. García-patrón, R. Tualle-brouri, N. J. Cerf et al., Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum-Key-Distribution System, Physical Review Letters, vol.98, issue.3, p.30503, 2007.
DOI : 10.1103/PhysRevLett.98.030503

URL : https://hal.archives-ouvertes.fr/hal-00509168

J. Lodewyck, M. Bloch, R. García-patrón, S. Fossier, E. Karpov et al., Quantum key distribution over 25 km with an all-fiber continuous-variable system, Phys. Rev. A, vol.76, issue.4, 2007.

J. Lodewyck, T. Debuisschert, R. Tualle-brouri, and P. Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005.
DOI : 10.1103/PhysRevA.72.050303

S. Lorenz, J. Rigas, M. Heid, U. L. Andersen, N. Lütkenhaus et al., Witnessing effective entanglement in a continuous variable prepare-and-measure setup and application to a quantum key distribution scheme using postselection, Physical Review A, vol.74, issue.4, p.42326, 2006.
DOI : 10.1103/PhysRevA.74.042326

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar et al., Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010.
DOI : 10.1038/nphoton.2010.214

X. Ma, S. Sun, M. Jiang, and L. Liang, Improved wavelength attack on practical continuous variables quantum key distribution system with heterodyne protocol. Arxiv preprint arXiv:1303, 2013.

X. Ma, S. Sun, M. Jiang, and L. Liang, Local oscillator fluctuation opens a loophole for eve in practical continuous-variable quantum key distribution system. Arxiv preprint arXiv:1303, p.6043, 2013.

J. C. David and . Mackay, Information Theory, Inference and Learning Algorithms, 2003.

H. Mahdavifar and A. Vardy, Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes, IEEE Transactions on Information Theory, vol.57, issue.10, pp.6428-6443, 2011.
DOI : 10.1109/TIT.2011.2162275

V. Makarov, Controlling passively quenched single photon detectors by bright light, New Journal of Physics, vol.11, issue.6, p.65003, 2009.
DOI : 10.1088/1367-2630/11/6/065003

R. Mari and T. Tanaka, Performance and construction of polar codes on symmetric binary-input memoryless channels, 2009 IEEE International Symposium on Information Theory, pp.1496-1500, 2009.
DOI : 10.1109/ISIT.2009.5205857

J. Martinez-mateo, D. Elkouss, and V. Martin, Interactive reconciliation with low-density parity-check codes, 2010 6th International Symposium on Turbo Codes & Iterative Information Processing, pp.270-274, 2010.
DOI : 10.1109/ISTC.2010.5613856

J. Martinez-mateo, D. Elkouss, and V. Martin, Blind reconciliation, Quant. Inf. Comp, vol.12, pp.9-10791, 2012.

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, EUROCRYPT '93, pp.386-397, 1994.
DOI : 10.1007/3-540-48285-7_33

D. Mayers, Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997.
DOI : 10.1103/PhysRevLett.78.3414

R. Mori and T. Tanaka, Non-binary polar codes using Reed-Solomon codes and algebraic geometry codes, 2010 IEEE Information Theory Workshop, 2010.
DOI : 10.1109/CIG.2010.5592755

R. Namiki and T. Hirano, Practical Limitation for Continuous-Variable Quantum Cryptography using Coherent States, Physical Review Letters, vol.92, issue.11, p.117901, 2004.
DOI : 10.1103/PhysRevLett.92.117901

M. Navascués, F. Grosshans, and A. Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006.
DOI : 10.1103/PhysRevLett.97.190502

G. Van-assche, N. J. Cerf, and M. Levy, Quantum distribution of gaussian keys using squeezed states, Phys. Rev. A, vol.63, p.52311, 2001.

T. Ogawa and H. Nagaoka, A new proof of the channel coding theorem via hypothesis testing in quantum information theory, Proceedings IEEE International Symposium on Information Theory,, p.73, 2002.
DOI : 10.1109/ISIT.2002.1023345

A. Pappa, P. Jouguet, T. Lawson, A. Chailloux, M. Legrã-c et al., Experimental plug & play quantum coin flipping Arxiv preprint arXiv:1306, 2013.

K. A. Patel, J. F. Dynes, I. Choi, A. W. Sharpe, A. R. Dixon et al., Coexistence of High-Bit-Rate Quantum Key Distribution and Data on Optical Fiber, Physical Review X, vol.2, issue.4, p.41010, 2012.
DOI : 10.1103/PhysRevX.2.041010

A. J. Sharpe, D. Shields, M. Stucki, C. Suda, T. Tamas et al., The secoqc quantum key distribution network in vienna, New J. Phys, vol.11, p.75001, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00559693

N. Peters, T. Toliver, R. J. Chapuran, S. Runser, C. Mcnown et al., Dense wavelength multiplexing of 1550???nm QKD with strong classical channels in reconfigurable networking environments, New Journal of Physics, vol.11, issue.4, p.45012, 2009.
DOI : 10.1088/1367-2630/11/4/045012

B. Qi, W. Zhu, L. Qian, and H. K. Lo, Feasibility of quantum key distribution through a dense wavelength division multiplexing network Experimental study on the gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers, New J. Phys. Phys. Rev. A, vol.12, issue.76, p.103042052323, 2007.

T. C. Ralph, Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, p.10303, 2000.
DOI : 10.1103/PhysRevA.61.010303

M. D. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Physical Review A, vol.62, issue.6, p.10303, 2000.
DOI : 10.1103/PhysRevA.62.062308

J. M. Renes, F. Dupuis, and R. Renner, Efficient Polar Coding of Quantum Information, Physical Review Letters, vol.109, issue.5, p.50504, 2012.
DOI : 10.1103/PhysRevLett.109.050504

R. Renner, SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.06, issue.01, 2005.
DOI : 10.1142/S0219749908003256

URL : https://hal.archives-ouvertes.fr/hal-00917115

R. Renner and J. I. Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.11, p.110504, 2009.
DOI : 10.1103/PhysRevLett.102.110504

URL : http://arxiv.org/abs/0809.2243

T. Richardson and R. Urbanke, Multi-edge type LDPC codes. presented at the Workshop honoring Prof. Bob McEliece on his 60th birthday , California Institute of Technology, 2002.

T. Richardson and R. Urbanke, Modern Coding Theory, 2008.
DOI : 10.1017/CBO9780511791338

T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, Design of capacity-approaching irregular low-density parity-check codes, IEEE Transactions on Information Theory, vol.47, issue.2, pp.619-637, 2001.
DOI : 10.1109/18.910578

R. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

D. Rosenberg, C. G. Peterson, J. W. Harrington, P. R. Rice, N. Dallmann et al., Practical long-distance quantum key distribution system using decoy levels, New Journal of Physics, vol.11, issue.4, p.45009, 2009.
DOI : 10.1088/1367-2630/11/4/045009

H. C. Tilborg, S. Liu, and M. V. Dijk, A practical protocol for advantage distillation and information reconciliation, Des. Codes Cryptography, vol.30, issue.1, pp.39-62, 2003.

Z. L. Sharpe, A. J. Yuan, S. Shields, M. Uchikoga, S. Legré et al., Field test of quantum key distribution in the tokyo qkd network, Opt. Express, vol.19, pp.10387-10409, 2011.

V. Scarani, H. Bechmann-pasquinucci, N. J. Cerf, M. Du?ek, N. Lütkenhaus et al., The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009.
DOI : 10.1103/RevModPhys.81.1301

V. Scarani and C. Kurtsiefer, The black paper of quantum cryptography: real implementation problems Arxiv preprint arXiv:0906, pp.4547-4549

V. Scarani and R. Renner, Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing, Physical Review Letters, vol.100, issue.20, 2008.
DOI : 10.1103/PhysRevLett.100.200501

T. Schmitt-manderbach, H. Weier, M. Fürst, R. Ursin, F. Tiefenbacher et al., Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144??km, Physical Review Letters, vol.98, issue.1, p.10504, 2007.
DOI : 10.1103/PhysRevLett.98.010504

C. P. Schnorr, Efficient Identification and Signatures for Smart Cards, Advances in Cryptology ? Crypto'89, pp.239-252, 1990.

C. E. Shannon, A mathematical theory of communication. The Bell System Technical Journal, pp.379-423, 1948.

Y. Shen, H. Zou, L. Tian, P. Chen, and J. Yuan, Experimental study on discretely modulated continuous-variable quantum key distribution, Physical Review A, vol.82, issue.2, p.22317, 2010.
DOI : 10.1103/PhysRevA.82.022317

Y. Shen, X. Peng, J. Yang, and H. Guo, Continuous-variable quantum key distribution with Gaussian source noise, Physical Review A, vol.83, issue.5, p.52304, 2011.
DOI : 10.1103/PhysRevA.83.052304

URL : http://arxiv.org/abs/1101.0871

M. A. Shokrollahi and R. Storn, Design of Efficient Erasure Codes with Differential Evolution, Proceedings of the 2000 IEEE international conference on Symposium on Information Theory, 2000.

P. W. Shor, Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM Journal on Computing, vol.26, issue.5, pp.1484-1509, 1997.
DOI : 10.1137/S0097539795293172

C. Silberhorn, T. C. Ralph, N. Lütkenhaus, and G. Leuchs, Continuous Variable Quantum Cryptography: Beating the 3??dB Loss Limit, Physical Review Letters, vol.89, issue.16, p.167901, 2002.
DOI : 10.1103/PhysRevLett.89.167901

R. Spekkens and T. Rudolph, Quantum protocol for cheatsensitive weak coin flipping, Phys. Rev. Lett, vol.89, issue.22, pp.1-4, 2002.

D. Stucki, M. Legré, F. Buntschu, B. Clausen, N. Felber et al., Long-term performance of the SwissQuantum quantum key distribution network in a field environment, New Journal of Physics, vol.13, issue.12, p.123001, 2011.
DOI : 10.1088/1367-2630/13/12/123001

D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin et al., High rate, long-distance quantum key distribution over 250???km of ultra low loss fibres, New Journal of Physics, vol.11, issue.7, p.75003, 2009.
DOI : 10.1088/1367-2630/11/7/075003

T. Sugimoto and K. Yamazaki, A study on secret key reconciliation protocol, IEICE Trans. Fundamentals, issue.10, pp.1987-1991, 2000.

]. T. Symul, V. Sharma, T. C. Ralph, and P. K. Lam, Coherent State Quantum Key Distribution with Continuous-Wave Laser Beams, Optical Fiber Communication Conference, p.6, 2010.
DOI : 10.1364/OFC.2010.OWC6

URL : http://espace.library.uq.edu.au/view/UQ:316275/UQ316275.pdf

T. Symul, D. J. Alton, M. Syed, A. M. Assad, C. Lance et al., Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise, Physical Review A, vol.76, issue.3, p.30303, 2007.
DOI : 10.1103/PhysRevA.76.030303

H. Takesue, S. Nam, Q. Zhang, R. H. Hadfield, T. Honjo et al., Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors, Nature Photonics, vol.8, issue.6, pp.343-348, 2007.
DOI : 10.1038/nphoton.2007.75

I. Tal and A. Vardy, List decoding of polar codes, IEEE International Symposium on Information Theory, pp.1-5, 2011.

S. Tokunaga, K. Shirasaki, and T. Hirano, Free-space continuous-variable Quantum Cryptography, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference, 2007.
DOI : 10.1109/CLEOE-IQEC.2007.4386790

R. Ursin, F. Tiefenbacher, T. Schmitt-manderbach, H. Weier, T. Scheidl et al., Entanglement-based quantum communication over 144???km, Nature Physics, vol.39, issue.7, pp.481-486, 2007.
DOI : 10.1103/PhysRevA.64.010102

URL : http://hdl.handle.net/11858/00-001M-0000-000F-B797-1

C. Vladyslav, R. Usenko, and . Filip, Feasibility of continuousvariable quantum key distribution with noisy coherent states, Phys. Rev. A, vol.81, p.22318, 2010.

G. Van-assche, Quantum Cryptography and Secret-Key Distillation, 2006.
DOI : 10.1017/CBO9780511617744

G. Van-assche, J. Cardinal, and N. J. Cerf, Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, p.394, 2004.
DOI : 10.1109/TIT.2003.822618

N. Walk, T. Symul, P. Lam, and T. C. Ralph, Security of continuous-variable quantum cryptography with Gaussian postselection, Physical Review A, vol.87, issue.2, 2012.
DOI : 10.1103/PhysRevA.87.020303

C. Weedbrook, A. M. Lance, W. P. Bowen, T. Symul, T. C. Ralph et al., Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, p.170504, 2004.
DOI : 10.1103/PhysRevLett.93.170504

URL : http://arxiv.org/abs/quant-ph/0405105

C. Weedbrook, S. Pirandola, S. Lloyd, and T. C. Ralph, Quantum Cryptography Approaching the Classical Limit, Physical Review Letters, vol.105, issue.11, p.110501, 2010.
DOI : 10.1103/PhysRevLett.105.110501

C. Weedbrook, S. Pirandola, and T. C. Ralph, Continuous-variable quantum key distribution using thermal states, Physical Review A, vol.86, issue.2, p.22318, 2012.
DOI : 10.1103/PhysRevA.86.022318

URL : http://arxiv.org/abs/1110.4617

C. Weedbrook, S. Pirandola, R. García-patrón, N. J. Cerf, T. C. Ralph et al., Gaussian quantum information, Reviews of Modern Physics, vol.84, issue.2, pp.621-669, 2012.
DOI : 10.1103/RevModPhys.84.621

M. N. Wegman and L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981.
DOI : 10.1016/0022-0000(81)90033-7

N. Mark, L. Wegman, and . Carter, New classes and applications of hash functions, FOCS, pp.175-182, 1979.

M. M. Wilde and S. Guha, Polar Codes for Classical-Quantum Channels, IEEE Transactions on Information Theory, vol.59, issue.2, pp.1175-1187, 2013.
DOI : 10.1109/TIT.2012.2218792

A. Winter, Coding theorem and strong converse for quantum channels, IEEE Transactions on Information Theory, vol.45, issue.7, pp.2481-2485, 1999.
DOI : 10.1109/18.796385

M. M. Wolf, G. Giedke, and J. I. Cirac, Extremality of Gaussian Quantum States, Physical Review Letters, vol.96, issue.8, p.80502, 2006.
DOI : 10.1103/PhysRevLett.96.080502

S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue, W. T. Buttler et al., Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A, vol.67, p.52303, 2003.

F. Xu, B. Qi, and H. K. Lo, Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010.
DOI : 10.1088/1367-2630/12/11/113026

N. Ng, H. Ying, S. K. Joshi, C. C. Ming, C. Kurtsiefer et al., Experimental implementation of bit commitment in the noisy-storage model, Nature Communications, vol.75, p.2012, 1326.
DOI : 10.1038/ncomms2268

B. Zhang, C. Yuan, and K. Parhi, Reduced-latency SC polar decoder architectures, 2012 IEEE International Conference on Communications (ICC), 2012.
DOI : 10.1109/ICC.2012.6364209

URL : http://arxiv.org/abs/1111.0704

Y. Zhao, Y. Gui, J. Chen, Z. Han, and G. Guo, Computational Complexity of Continuous Variable Quantum Key Distribution, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2803-2807, 2008.
DOI : 10.1109/TIT.2008.921889

Y. Zhao, C. Fung, B. Qi, C. Chen, and H. Lo, Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008.
DOI : 10.1103/PhysRevA.78.042333