Can Quantum-Mechanical Description of Physical Reality Be Considered Complete?, Physical Review, vol.47, issue.10, pp.777-780, 1935. ,
DOI : 10.1103/PhysRev.47.777
On the einstein-podolsky-rosen paradox, Physics, vol.1, issue.195, 1964. ,
: A New Violation of Bell's Inequalities, Physical Review Letters, vol.49, issue.2, pp.91-94, 1982. ,
DOI : 10.1103/PhysRevLett.49.91
Conjugate coding. SIGACT News, pp.78-88, 1983. ,
DOI : 10.1145/1008908.1008920
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Review, vol.41, pp.303-332, 1999. ,
Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate, Optics Express, vol.16, issue.23, pp.1618790-18979, 2008. ,
DOI : 10.1364/OE.16.018790
URL : http://arxiv.org/abs/0810.1069
The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, pp.1301-1350, 2009. ,
DOI : 10.1103/RevModPhys.81.1301
Foundations of Cryptography, volume I, Basic Tools, 2003. ,
Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, pp.3414-3417, 1997. ,
DOI : 10.1103/PhysRevLett.78.3414
URL : http://arxiv.org/abs/quant-ph/9605044
Why quantum bit commitment and ideal quantum coin tossing are impossible, Physica D: Nonlinear Phenomena, vol.120, issue.1-2, pp.177-187, 1998. ,
DOI : 10.1016/S0167-2789(98)00053-0
URL : http://arxiv.org/abs/quant-ph/9605026
Quantum key distribution over 67 km with a plug&play system, New Journal of Physics, vol.4, p.41, 2002. ,
DOI : 10.1088/1367-2630/4/1/341
Fair loss-tolerant quantum coin flipping, Physical Review A, vol.80, issue.6, p.62321, 2009. ,
DOI : 10.1103/PhysRevA.80.062321
Experimental loss-tolerant quantum coin flipping, Nature Communications, vol.84, p.561, 2011. ,
DOI : 10.1038/ncomms1572
Tight bounds for classical and quantum coin flipping, Proceedings of the 8th Theory of Cryptography Conference, 2011. ,
Going beyond bell's theorem, Bell's Theorem, Quantum Theory, and Conceptions of the Universe, pp.69-72, 1989. ,
Extreme quantum entanglement in a superposition of macroscopically distinct states, Physical Review Letters, vol.65, issue.15, pp.1838-1840, 1990. ,
DOI : 10.1103/PhysRevLett.65.1838
Universal Blind Quantum Computation, 2009 50th Annual IEEE Symposium on Foundations of Computer Science, pp.517-526, 2009. ,
DOI : 10.1109/FOCS.2009.36
URL : http://arxiv.org/abs/0807.4154
A One-Way Quantum Computer, Physical Review Letters, vol.86, issue.22, pp.5188-5191, 2001. ,
DOI : 10.1103/PhysRevLett.86.5188
URL : http://arxiv.org/pdf/quant-ph/0510135v1.pdf
Multi-party Pseudo-Telepathy, Proceedings of the 8th International Workshop on Algorithms and Data Structures, pp.1-11, 2003. ,
DOI : 10.1007/978-3-540-45078-8_1
URL : http://arxiv.org/abs/quant-ph/0306042
Quantum Games and Quantum Strategies, Physical Review Letters, vol.83, issue.15, pp.3077-3080, 1999. ,
DOI : 10.1103/PhysRevLett.83.3077
Quantum strategic game theory, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on, ITCS '12, 2011. ,
DOI : 10.1145/2090236.2090241
URL : http://arxiv.org/abs/1012.5141
Games with incomplete information played by bayesian players, i-iii, Management SciencePart I), vol.14, issue.147, pp.159-183, 1967. ,
Proposed Experiment to Test Local Hidden-Variable Theories, Physical Review Letters, vol.23, issue.15, pp.880-884, 1969. ,
DOI : 10.1103/PhysRevLett.23.880
Connection between Bell nonlocality and Bayesian game theory, Nature Communications, vol.4, p.2057, 2013. ,
DOI : 10.1007/BF00417500
URL : http://doi.org/10.1038/ncomms3057
An Introduction to Game Theory, 2003. ,
Consequences and limits of nonlocal strategies, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004., pp.236-249, 2004. ,
DOI : 10.1109/CCC.2004.1313847
Experimental characterization of universal one-way quantum computing, New Journal of Physics, vol.15, issue.5, p.53030, 2013. ,
DOI : 10.1088/1367-2630/15/5/053030
URL : http://doi.org/10.1088/1367-2630/15/5/053030
Practical quantum coin flipping, Physical Review A, vol.84, issue.5, p.52305, 2011. ,
DOI : 10.1103/PhysRevA.84.052305
URL : https://hal.archives-ouvertes.fr/hal-00667353
Multipartite Entanglement Verification Resistant against Dishonest Parties, Physical Review Letters, vol.108, issue.26, p.260502, 2012. ,
DOI : 10.1103/PhysRevLett.108.260502
URL : https://hal.archives-ouvertes.fr/hal-00667358
Experimental plug and play quantum coin flipping, Nature Communications, vol.7, p.3717, 2014. ,
DOI : 10.1063/1.2432296
URL : https://hal.archives-ouvertes.fr/hal-01094106
Quantum Computation and Quantum Information, 2000. ,
Theory of Quantum Computation URL https://cs.uwaterloo.ca, Lecture Notes, 2011. ,
Quantum generalizations of bell's inequality, Letters in Mathematical Physics, pp.93-100, 1980. ,
Quantum secret sharing, Physical Review A, vol.59, issue.3, pp.1829-1834, 1999. ,
DOI : 10.1103/PhysRevA.59.1829
Quantum mysteries revisited, American Journal of Physics, vol.58, issue.8, p.731, 1990. ,
Statistical Zero Knowledge and quantum one-way functions, Theoretical Computer Science, vol.378, issue.1, pp.101-116, 2007. ,
DOI : 10.1016/j.tcs.2007.03.013
URL : http://doi.org/10.1016/j.tcs.2007.03.013
Optimal Bounds for Quantum Bit Commitment, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pp.354-362, 2011. ,
DOI : 10.1109/FOCS.2011.42
URL : http://arxiv.org/abs/1102.1678
Quantum bit escrow, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.705-714, 2000. ,
DOI : 10.1145/335305.335404
???Plug and play??? systems for quantum cryptography, Applied Physics Letters, vol.50, issue.7, 1997. ,
DOI : 10.1049/el:19930424
URL : http://arxiv.org/abs/quant-ph/9611042
The security of practical quantum key distribution, Reviews of Modern Physics, vol.81, issue.3, p.1301, 2009. ,
DOI : 10.1103/RevModPhys.81.1301
Coin flipping by telephone a protocol for solving impossible problems, Advances in Cryptology; a Report on CRYPTO'81, pp.11-15, 1981. ,
DOI : 10.1145/1008908.1008911
Coin Tossing is Strictly Weaker than Bit Commitment, Physical Review Letters, vol.83, issue.25, pp.5382-5384, 1999. ,
DOI : 10.1103/PhysRevLett.83.5382
URL : http://arxiv.org/abs/quant-ph/9810067
A new protocol and lower bounds for quantum coin flipping, Journal of Computer and System Sciences, vol.68, issue.2, pp.398-416, 2004. ,
DOI : 10.1016/j.jcss.2003.07.010
URL : http://doi.org/10.1016/j.jcss.2003.07.010
Quantum Protocol for Cheat-Sensitive Weak Coin Flipping, Physical Review Letters, vol.89, issue.22, pp.1-4, 2002. ,
DOI : 10.1103/PhysRevLett.89.227901
URL : http://arxiv.org/abs/quant-ph/0202118
An entanglement-based protocol for strong coin tossing with bias 1/4, Physics Letters A, vol.362, issue.5-6, pp.5-6390, 2007. ,
DOI : 10.1016/j.physleta.2006.10.062
URL : http://arxiv.org/abs/quant-ph/0609034
Bit-commitment-based quantum coin flipping, Physical Review A, vol.67, issue.1, p.12304, 2003. ,
DOI : 10.1103/PhysRevA.67.012304
Quantum coin-flipping, Quantum Information Processing (QIP 2003) MSRI, 1317. ,
Optimal Quantum Strong Coin Flipping, 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 2009. ,
DOI : 10.1109/FOCS.2009.71
URL : http://arxiv.org/abs/0904.1511
Quantum Weak Coin-Flipping with Bias of 0.192, 45th Annual IEEE Symposium on Foundations of Computer Science, pp.2-11, 2004. ,
DOI : 10.1109/FOCS.2004.55
URL : http://arxiv.org/abs/quant-ph/0403193
Iordanis Kerenidis, and Loïck Magnin. A simpler proof of existence of quantum weak coin flipping with arbitrarily small bias, p.7166, 2014. ,
Limitations on Practical Quantum Cryptography, Physical Review Letters, vol.85, issue.6, pp.1330-1333, 2000. ,
DOI : 10.1103/PhysRevLett.85.1330
Improved loss-tolerant quantum coin flipping, AQIS, 2010. ,
Family of loss-tolerant quantum coin-flipping protocols, Physical Review A, vol.82, issue.5, p.52307, 2010. ,
DOI : 10.1103/PhysRevA.82.052307
URL : http://arxiv.org/abs/1006.1121
Large n quantum cryptography, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing, QCMC02, 2002. ,
Quantum coin tossing and bit-string generation in the presence of noise Provably secure experimental quantum bit-string generation, Phys. Rev. A Phys. Rev. Lett, vol.69, issue.94, p.022322050503, 2004. ,
Experimental Quantum Coin Tossing, Physical Review Letters, vol.94, issue.4, p.40501, 2005. ,
DOI : 10.1103/PhysRevLett.94.040501
Experimental quantum tossing of a single coin, New Journal of Physics, vol.10, issue.8, p.83087, 2008. ,
DOI : 10.1088/1367-2630/10/8/083037
URL : https://hal.archives-ouvertes.fr/hal-00362437
Experimental implementation of bit commitment in the noisy storage model, Nature Communications, vol.3, p.1326, 2012. ,
An experimental implementation of oblivious transfer in the noisy storage model, 2013. ,
Experimental Bit Commitment Based on Quantum Communication and Special Relativity, Physical Review Letters, vol.111, issue.18, p.180504, 2013. ,
DOI : 10.1103/PhysRevLett.111.180504
URL : http://arxiv.org/abs/1306.4801
Optimization of coherent attacks in generalizations of the bb84 quantum bit commitment protocol, Quantum Information and Computation, vol.2, issue.1, pp.66-96, 2002. ,
Implementation of two-party protocols in the noisy-storage model, Physical Review A, vol.81, issue.5, p.52336, 2010. ,
DOI : 10.1103/PhysRevA.81.052336
Superconducting nanowire single-photon detectors: physics and applications, Superconductor Science and Technology, vol.25, issue.6, p.63001, 2012. ,
DOI : 10.1088/0953-2048/25/6/063001
URL : http://arxiv.org/abs/1204.5560
Cryptography from Noisy Storage, Physical Review Letters, vol.100, issue.22, p.220502, 2008. ,
DOI : 10.1103/PhysRevLett.100.220502
URL : http://arxiv.org/abs/0711.2895
Quantum weak coin flipping with arbitrarily small bias, p.4114, 2007. ,
Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005. ,
DOI : 10.1103/PhysRevLett.94.230504
URL : http://arxiv.org/abs/quant-ph/0411004
Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography, Physical Review Letters, vol.94, issue.23, p.230503, 2005. ,
DOI : 10.1103/PhysRevLett.94.230503
Experimental Quantum Key Distribution with Decoy States, Physical Review Letters, vol.96, issue.7, p.70502, 2006. ,
DOI : 10.1103/PhysRevLett.96.070502
URL : http://arxiv.org/abs/quant-ph/0503192
Phase-remapping attack in practical quantum-key-distribution systems, Physical Review A, vol.75, issue.3, p.32314, 2007. ,
DOI : 10.1103/PhysRevA.75.032314
URL : http://arxiv.org/abs/quant-ph/0601115
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New Journal of Physics, vol.12, issue.11, p.113026, 2010. ,
DOI : 10.1088/1367-2630/12/11/113026
Effects of detector efficiency mismatch on security of quantum cryptosystems, Physical Review A, vol.74, issue.2, p.22313, 2006. ,
DOI : 10.1103/PhysRevA.74.022313
Time-shift attack in practical quantum cryptosystems, Quantum Information and Computation, vol.7, p.73, 2007. ,
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Physical Review A, vol.78, issue.4, p.42333, 2008. ,
DOI : 10.1103/PhysRevA.78.042333
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010. ,
DOI : 10.1038/nphoton.2010.214
URL : http://arxiv.org/abs/1008.4593
Experimental quantum key distribution with active phase randomization, Applied Physics Letters, vol.4, issue.4, p.44106, 2007. ,
DOI : 10.1364/OE.14.004264
URL : http://arxiv.org/abs/quant-ph/0611059
Security analysis of an untrusted source for quantum key distribution: passive approach, New Journal of Physics, vol.12, issue.2, p.23024, 2010. ,
DOI : 10.1088/1367-2630/12/2/023024
Quantum key distribution with an unknown and untrusted source, Physical Review A, vol.77, issue.5, p.52327, 2008. ,
DOI : 10.1103/PhysRevA.77.052327
URL : http://arxiv.org/abs/0802.2725
Robust self-testing of the singlet, Journal of Physics A: Mathematical and Theoretical, vol.45, issue.45, p.455304, 2012. ,
DOI : 10.1088/1751-8113/45/45/455304
One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering, Physical Review A, vol.85, issue.1, p.10301, 2012. ,
DOI : 10.1103/PhysRevA.85.010301
URL : http://arxiv.org/abs/1109.1435
Steering, Entanglement, Nonlocality, and the Einstein-Podolsky-Rosen Paradox, Physical Review Letters, vol.98, issue.14, p.140402, 2007. ,
DOI : 10.1103/PhysRevLett.98.140402
Entanglement, Einstein-Podolsky-Rosen correlations, Bell nonlocality, and steering, Physical Review A, vol.76, issue.5, p.52116, 2007. ,
DOI : 10.1103/PhysRevA.76.052116
Arbitrarily loss-tolerant einstein-podolsky-rosen steering allowing a demonstration over 1 km of optical fiber with no detection loophole, Phys. Rev. X, vol.2, p.31003, 2012. ,
Loophole-free einstein?podolsky?rosen experiment via quantum steering Conclusive quantum steering with superconducting transition edge sensors, New Journal of Physics Nature Communications, vol.14, issue.3, p.53030625, 2011. ,
Recasting mermin's multi-player game into the framework of pseudo-telepathy, Quantum Information and Computation, vol.5, issue.7, pp.538-550, 2005. ,
Device-Independent Witnesses of Genuine Multipartite Entanglement, Physical Review Letters, vol.106, issue.25, p.250404, 2011. ,
DOI : 10.1103/PhysRevLett.106.250404
URL : http://arxiv.org/abs/1102.0197
Self-testing graph states Preprint at http://arxiv.org/abs, 1010. ,
Unified criteria for multipartite quantum nonlocality, Physical Review A, vol.84, issue.3, p.32115, 2011. ,
DOI : 10.1103/PhysRevA.84.032115
URL : http://arxiv.org/abs/1008.5014
Multiparty quantum communication complexity, Physical Review A, vol.60, issue.4, p.2737, 1999. ,
DOI : 10.1103/PhysRevA.60.2737
URL : http://arxiv.org/abs/quant-ph/9710054
Quantum detection and estimation theory, Journal of Statistical Physics, vol.15, issue.1, p.231, 1969. ,
DOI : 10.1007/BF01007479
Multiparty unconditionally secure protocols (extended abstract), Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC), pp.11-19, 1988. ,
DOI : 10.1007/3-540-48184-2_43
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06), pp.249-260, 2006. ,
DOI : 10.1109/FOCS.2006.68
URL : http://arxiv.org/abs/0801.1544
Theory of Games and Economic Behavior, 1953. ,
Non-Cooperative Games, The Annals of Mathematics, vol.54, issue.2, pp.286-295, 1951. ,
DOI : 10.2307/1969529
Bounding the Set of Quantum Correlations, Physical Review Letters, vol.98, issue.1, p.10401, 2007. ,
DOI : 10.1103/PhysRevLett.98.010401
A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations, New Journal of Physics, vol.10, issue.7, p.73013, 2008. ,
DOI : 10.1088/1367-2630/10/7/073013
Convergent Relaxations of Polynomial Optimization Problems with Noncommuting Variables, SIAM Journal on Optimization, vol.20, issue.5, p.2157, 2010. ,
DOI : 10.1137/090760155
URL : http://arxiv.org/abs/0903.4368
Multi-player quantum games, Physical Review A, vol.64, issue.3, p.30301, 2001. ,