Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, p.145, 2002. ,
DOI : 10.1103/RevModPhys.74.145
Practical quantum key distribution over 60 hours at an optical fiber distance of 20km using weak and vacuum decoy pulses for enhanced security, Optics Express, vol.15, issue.13, p.8465, 2007. ,
DOI : 10.1364/OE.15.008465
Decoy pulse quantum key distribution for practical purposes, IET Optoelectronics, vol.2, issue.5, p.195, 2008. ,
DOI : 10.1049/iet-opt:20070091
Free-running InGaAs???InP avalanche photodiode with active quenching for single photon counting at telecom wavelengths, Applied Physics Letters, vol.91, issue.20, p.201114, 2007. ,
DOI : 10.1063/1.2815916
High-fidelity transmission of polarization encoded qubits from an entangled source over 100 km of fiber, Optics Express, vol.15, issue.12, p.7853, 2007. ,
DOI : 10.1364/OE.15.007853
Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, p.50303, 2005. ,
DOI : 10.1103/PhysRevA.72.050303
Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum-Key-Distribution System, Physical Review Letters, vol.98, issue.3, p.30503, 2007. ,
DOI : 10.1103/PhysRevLett.98.030503
URL : https://hal.archives-ouvertes.fr/hal-00509168
Field test of a continuous-variable quantum key distribution prototype, New Journal of Physics, vol.11, issue.4, p.45023, 2009. ,
DOI : 10.1088/1367-2630/11/4/045023
URL : https://hal.archives-ouvertes.fr/hal-00553585
Free space quantum key distribution: Towards a real life application, Fortschritte der Physik, vol.61, issue.43, p.840, 2006. ,
DOI : 10.1002/prop.200610322
Low cost and compact quantum key distribution, New Journal of Physics, vol.8, issue.10, p.249, 2006. ,
DOI : 10.1088/1367-2630/8/10/249
Quantum cryptographic network based on quantum memories, Physical Review A, vol.54, issue.4, pp.2651-2659, 1996. ,
DOI : 10.1103/PhysRevA.54.2651
Quantum cryptography on multiuser optical fibre networks, Nature, vol.385, issue.6611, pp.47-56, 1997. ,
DOI : 10.1038/385047a0
Quantum Cryptography on Optical Fiber Networks, Optical Fiber Technology, vol.4, issue.4, pp.345-70, 1998. ,
DOI : 10.1006/ofte.1998.0270
Building the quantum network*, New Journal of Physics, vol.4, p.46, 2002. ,
DOI : 10.1088/1367-2630/4/1/346
Architecture and protocols of the future European quantum key distribution network, Security and Communication Networks, vol.49, issue.1, pp.57-74, 2008. ,
DOI : 10.1002/sec.13
Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication, Physical Review Letters, vol.81, issue.26, pp.5932-5937, 1998. ,
DOI : 10.1103/PhysRevLett.81.5932
Quantum repeaters based on entanglement purification, Physical Review A, vol.59, issue.1, pp.169-81, 1999. ,
DOI : 10.1103/PhysRevA.59.169
Quantum key distribution over 67 km with a plug&play system, New Journal of Physics, vol.4, p.41, 2002. ,
DOI : 10.1088/1367-2630/4/1/341
???Plug and play??? systems for quantum cryptography, Applied Physics Letters, vol.70, issue.7, p.793, 1997. ,
DOI : 10.1063/1.118224
Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Physical Review Letters, vol.92, issue.5, p.57901, 2004. ,
DOI : 10.1103/PhysRevLett.92.057901
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography, Physical Review A, vol.71, issue.4, p.42316, 2005. ,
DOI : 10.1103/PhysRevA.71.042316
Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, vol.72, issue.3, p.32301, 2005. ,
DOI : 10.1103/PhysRevA.72.032301
Faked states attack on quantum cryptosystems, Journal of Modern Optics, vol.48, issue.5, p.691, 2005. ,
DOI : 10.1103/PhysRevA.63.012309
Effects of detector efficiency mismatch on security of quantum cryptosystems, Physical Review A, vol.74, issue.2, p.22313, 2005. ,
DOI : 10.1103/PhysRevA.74.022313
Quantum Key Distribution with High Loss: Toward Global Secure Communication, Physical Review Letters, vol.91, issue.5, p.57901, 2003. ,
DOI : 10.1103/PhysRevLett.91.057901
Unconditionally secure quantum key distribution over 50???km of standard telecom fibre, Electronics Letters, vol.40, issue.25, p.1603, 2004. ,
DOI : 10.1049/el:20045038
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security, Journal of Cryptology, vol.18, issue.2, p.133, 2005. ,
DOI : 10.1007/s00145-004-0142-y
Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography, New Journal of Physics, vol.10, issue.1, p.13031, 2008. ,
DOI : 10.1088/1367-2630/10/1/013031
Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography, Physical Review Letters, vol.94, issue.23, p.230503, 2005. ,
DOI : 10.1103/PhysRevLett.94.230503
Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005. ,
DOI : 10.1103/PhysRevLett.94.230504
Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, p.661, 1991. ,
DOI : 10.1103/PhysRevLett.67.661
Quantum cryptography without Bell???s theorem, Physical Review Letters, vol.68, issue.5, p.557, 1992. ,
DOI : 10.1103/PhysRevLett.68.557
with an all-fiber continuous-variable system, Physical Review A, vol.76, issue.4, p.42305, 2007. ,
DOI : 10.1103/PhysRevA.76.042305
Secret-Key Reconciliation by Public Discussion, Advances in Cryptology: Eurocrypt '93, pp.410-433, 1993. ,
DOI : 10.1007/3-540-48285-7_35
Internet protocol http, 1981. ,
Version 6 (IPv6) specification http, Internet Protocol, 1998. ,
793: Transmission control protocol http://www.ietf.org/rfc/rfc793, pp.117-126, 1131. ,
Maximal flow through a network, Journal canadien de math??matiques, vol.8, issue.0, pp.399-404, 1956. ,
DOI : 10.4153/CJM-1956-045-5
Beyond the flow decomposition barrier, Journal of the ACM, vol.45, issue.5, pp.783-97, 1998. ,
DOI : 10.1145/290179.290181
High speed single photon detection in the near infrared, Applied Physics Letters, vol.91, issue.4, p.41114, 2007. ,
DOI : 10.1063/1.2760135