N. Gisin, G. Ribordy, W. Tittel, and Z. , Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, p.145, 2002.
DOI : 10.1103/RevModPhys.74.145

J. Dynes, Z. Yuan, A. Sharpe, and A. Shields, Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security, Optics Express, vol.15, issue.13, p.8465, 2007.
DOI : 10.1364/OE.15.008465

J. Dynes, Z. Yuan, A. Sharpe, and A. Shields, Decoy pulse quantum key distribution for practical purposes, IET Optoelectronics, vol.2, issue.5, p.195, 2008.
DOI : 10.1049/iet-opt:20070091

R. Thew, D. Stucki, J. D. Gautier, H. Zbinden, and A. Rochas, Free-running InGaAs???InP avalanche photodiode with active quenching for single photon counting at telecom wavelengths, Applied Physics Letters, vol.91, issue.20, p.201114, 2007.
DOI : 10.1063/1.2815916

H. Hübel, M. Vanner, T. Lederer, B. Blauensteiner, T. Lorünser et al., High-fidelity transmission of polarization encoded qubits from an entangled source over 100 km of fiber, Optics Express, vol.15, issue.12, p.7853, 2007.
DOI : 10.1364/OE.15.007853

J. Lodewyck, T. Debuisschert, R. Tualle-brouri, and P. Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005.
DOI : 10.1103/PhysRevA.72.050303

J. Lodewyck, T. Debuisschert, R. Garcia-patron, R. Tualle-brouri, N. J. Cerf et al., Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum-Key-Distribution System, Physical Review Letters, vol.98, issue.3, p.30503, 2007.
DOI : 10.1103/PhysRevLett.98.030503

URL : https://hal.archives-ouvertes.fr/hal-00509168

S. Fossier, E. Diamanti, T. Debuisschert, A. Villing, R. Tualle-brouri et al., Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009.
DOI : 10.1088/1367-2630/11/4/045023

URL : https://hal.archives-ouvertes.fr/hal-00553585

H. Weier, T. Schmitt-manderbach, N. Regner, C. Kurtsiefer, and . Weinfurter, Free space quantum key distribution: Towards a real life application, Fortschritte der Physik, vol.61, issue.43, p.840, 2006.
DOI : 10.1002/prop.200610322

J. Duligall, M. Godfrey, K. Harrison, W. Munro, and J. Rarity, Low cost and compact quantum key distribution, New Journal of Physics, vol.8, issue.10, p.249, 2006.
DOI : 10.1088/1367-2630/8/10/249

E. Biham, B. Huttner, and M. , Quantum cryptographic network based on quantum memories, Physical Review A, vol.54, issue.4, pp.2651-2659, 1996.
DOI : 10.1103/PhysRevA.54.2651

P. Townsend, Quantum cryptography on multiuser optical fibre networks, Nature, vol.385, issue.6611, pp.47-56, 1997.
DOI : 10.1038/385047a0

P. Townsend, Quantum Cryptography on Optical Fiber Networks, Optical Fiber Technology, vol.4, issue.4, pp.345-70, 1998.
DOI : 10.1006/ofte.1998.0270

C. Elliott, Building the quantum network*, New Journal of Physics, vol.4, p.46, 2002.
DOI : 10.1088/1367-2630/4/1/346

M. Dianati, R. Alléaume, M. Gagnaire, and X. Shen, Architecture and protocols of the future European quantum key distribution network, Security and Communication Networks, vol.49, issue.1, pp.57-74, 2008.
DOI : 10.1002/sec.13

H. J. Briegel, W. Dür, J. Cirac, and P. Zoller, Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication, Physical Review Letters, vol.81, issue.26, pp.5932-5937, 1998.
DOI : 10.1103/PhysRevLett.81.5932

W. Dür, H. J. Briegel, J. Cirac, and P. Zoller, Quantum repeaters based on entanglement purification, Physical Review A, vol.59, issue.1, pp.169-81, 1999.
DOI : 10.1103/PhysRevA.59.169

D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, Quantum key distribution over 67 km with a plug&play system, New Journal of Physics, vol.4, p.41, 2002.
DOI : 10.1088/1367-2630/4/1/341

A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden et al., ???Plug and play??? systems for quantum cryptography, Applied Physics Letters, vol.70, issue.7, p.793, 1997.
DOI : 10.1063/1.118224

V. Scarani, A. Acin, G. Ribordy, and G. , Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Physical Review Letters, vol.92, issue.5, p.57901, 2004.
DOI : 10.1103/PhysRevLett.92.057901

A. Niederberger, V. Scarani, and N. Gisin, Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography, Physical Review A, vol.71, issue.4, p.42316, 2005.
DOI : 10.1103/PhysRevA.71.042316

C. Branciard, N. Gisin, B. Kraus, and V. Scarani, Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, vol.72, issue.3, p.32301, 2005.
DOI : 10.1103/PhysRevA.72.032301

V. Makarov and D. Hjelme, Faked states attack on quantum cryptosystems, Journal of Modern Optics, vol.48, issue.5, p.691, 2005.
DOI : 10.1103/PhysRevA.63.012309

V. Makarov, A. Anisimov, and J. Skaar, Effects of detector efficiency mismatch on security of quantum cryptosystems, Physical Review A, vol.74, issue.2, p.22313, 2005.
DOI : 10.1103/PhysRevA.74.022313

W. Hwang, Quantum Key Distribution with High Loss: Toward Global Secure Communication, Physical Review Letters, vol.91, issue.5, p.57901, 2003.
DOI : 10.1103/PhysRevLett.91.057901

C. Gobby, Z. Yuan, and A. Shields, Unconditionally secure quantum key distribution over 50???km of standard telecom fibre, Electronics Letters, vol.40, issue.25, p.1603, 2004.
DOI : 10.1049/el:20045038

H. K. Lo, H. Chau, and M. Ardehali, Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security, Journal of Cryptology, vol.18, issue.2, p.133, 2005.
DOI : 10.1007/s00145-004-0142-y

C. Branciard, N. Gisin, and V. Scarani, Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography, New Journal of Physics, vol.10, issue.1, p.13031, 2008.
DOI : 10.1088/1367-2630/10/1/013031

X. Wang, Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography, Physical Review Letters, vol.94, issue.23, p.230503, 2005.
DOI : 10.1103/PhysRevLett.94.230503

H. K. Lo, X. Ma, and C. K. , Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005.
DOI : 10.1103/PhysRevLett.94.230504

A. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, p.661, 1991.
DOI : 10.1103/PhysRevLett.67.661

C. Bennett, G. Brassard, and N. Mermin, Quantum cryptography without Bell???s theorem, Physical Review Letters, vol.68, issue.5, p.557, 1992.
DOI : 10.1103/PhysRevLett.68.557

J. Lodewyck, with an all-fiber continuous-variable system, Physical Review A, vol.76, issue.4, p.42305, 2007.
DOI : 10.1103/PhysRevA.76.042305

G. Brassard and L. Salvail, Secret-Key Reconciliation by Public Discussion, Advances in Cryptology: Eurocrypt '93, pp.410-433, 1993.
DOI : 10.1007/3-540-48285-7_35

M. Del-rey, Internet protocol http, 1981.

S. Deering and R. Hinden, Version 6 (IPv6) specification http, Internet Protocol, 1998.

J. Moy, 793: Transmission control protocol http://www.ietf.org/rfc/rfc793, pp.117-126, 1131.

L. R. Ford and D. Fulkerson, Maximal flow through a network, Journal canadien de math??matiques, vol.8, issue.0, pp.399-404, 1956.
DOI : 10.4153/CJM-1956-045-5

A. Goldberg and S. Rao, Beyond the flow decomposition barrier, Journal of the ACM, vol.45, issue.5, pp.783-97, 1998.
DOI : 10.1145/290179.290181

Z. Yuan, B. E. Kardynal, A. W. Sharpe, and A. Shields, High speed single photon detection in the near infrared, Applied Physics Letters, vol.91, issue.4, p.41114, 2007.
DOI : 10.1063/1.2760135