S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102, 180504 (2009).

[Crossref]
[PubMed]

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

Z. Zhang and P. L. Voss, “Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems,” Opt. Exp. 17, 12090–12108 (2009).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

M. Heid and N. Lütkenhaus, “Security of coherent-state quantum cryptography in the presence of Gaussian noise,” Phys. Rev. A 76, 022313 (2007).

[Crossref]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

R. Namiki and T. Hirano, “Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection,” Phys. Rev. A 74, 032302 (2006).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

S. L. Braunstein and P. Van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005).

[Crossref]

F. Grosshans, “Collective attacks and unconditional security in continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020504 (2005).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “Security bounds for continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]
[PubMed]

S. Lorenz, N. Korolkova, and G. Leuchs, “Continuous-variable quantum key distribution using polarization encoding and post selection,” Appl. Phys. B 79, 273–277 (2004).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

N. J. Cerf, M. Lévy, and G. Van Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63, 052311 (2001).

[Crossref]

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

[Crossref]
[PubMed]

C. H. Bennett and G. Grassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, Newyork, 1984), 175–179.

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “Security bounds for continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]
[PubMed]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

C. H. Bennett and G. Grassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, Newyork, 1984), 175–179.

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

S. L. Braunstein and P. Van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

N. J. Cerf, M. Lévy, and G. Van Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63, 052311 (2001).

[Crossref]

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, (Cambridge University Press, UK, 2000).

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

[Crossref]
[PubMed]

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102, 180504 (2009).

[Crossref]
[PubMed]

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans and P. Grangier, “Reverse reconciliation protocols for quantum cryptography with continuous variables,” http://www.arxiv.org/abs/quant-ph/0204127v1.

C. H. Bennett and G. Grassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, Newyork, 1984), 175–179.

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

F. Grosshans, “Collective attacks and unconditional security in continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020504 (2005).

[Crossref]
[PubMed]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans and P. Grangier, “Reverse reconciliation protocols for quantum cryptography with continuous variables,” http://www.arxiv.org/abs/quant-ph/0204127v1.

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

M. Heid and N. Lütkenhaus, “Security of coherent-state quantum cryptography in the presence of Gaussian noise,” Phys. Rev. A 76, 022313 (2007).

[Crossref]

R. Namiki and T. Hirano, “Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection,” Phys. Rev. A 74, 032302 (2006).

[Crossref]

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

S. Lorenz, N. Korolkova, and G. Leuchs, “Continuous-variable quantum key distribution using polarization encoding and post selection,” Appl. Phys. B 79, 273–277 (2004).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

S. Lorenz, N. Korolkova, and G. Leuchs, “Continuous-variable quantum key distribution using polarization encoding and post selection,” Appl. Phys. B 79, 273–277 (2004).

[Crossref]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102, 180504 (2009).

[Crossref]
[PubMed]

N. J. Cerf, M. Lévy, and G. Van Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63, 052311 (2001).

[Crossref]

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

S. Lorenz, N. Korolkova, and G. Leuchs, “Continuous-variable quantum key distribution using polarization encoding and post selection,” Appl. Phys. B 79, 273–277 (2004).

[Crossref]

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

M. Heid and N. Lütkenhaus, “Security of coherent-state quantum cryptography in the presence of Gaussian noise,” Phys. Rev. A 76, 022313 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

R. Namiki and T. Hirano, “Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection,” Phys. Rev. A 74, 032302 (2006).

[Crossref]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “Security bounds for continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]
[PubMed]

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, (Cambridge University Press, UK, 2000).

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

N. J. Cerf, M. Lévy, and G. Van Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63, 052311 (2001).

[Crossref]

S. L. Braunstein and P. Van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005).

[Crossref]

Z. Zhang and P. L. Voss, “Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems,” Opt. Exp. 17, 12090–12108 (2009).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

Z. Zhang and P. L. Voss, “Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems,” Opt. Exp. 17, 12090–12108 (2009).

[Crossref]

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

S. Lorenz, N. Korolkova, and G. Leuchs, “Continuous-variable quantum key distribution using polarization encoding and post selection,” Appl. Phys. B 79, 273–277 (2004).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421, 238–241 (2003).

[Crossref]
[PubMed]

S. Fossier, E. Diamanti, T. Debuisschert, R. Tualle-Brouri, and P. Grangier, “Field test of a continuous-variable quantum key distribution prototype,” New. J. Phys. 11, 045023 (2009).

[Crossref]

Z. Zhang and P. L. Voss, “Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems,” Opt. Exp. 17, 12090–12108 (2009).

[Crossref]

Y. Zhao, M. Heid, J. Rigas, and N. Lütkenhaus, “Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks,” Phys. Rev. A 79, 012307 (2009).

[Crossref]

B. Qi, L. L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76, 052323 (2007).

[Crossref]

J. Lodewyck, M. Bloch, R. Garcia-Patron, S. Fossier, E. Karpov, E. Diamanti, T. Debuisschert, N. J. Cerf, R. Tualle-Brouri, S. W. McLaughlin, and P. Grangier, “Quantum key distribution over 25 km with an all-fiber continuous-variable system,” Phys. Rev. A 76, 042305 (2007).

[Crossref]

N. J. Cerf, M. Lévy, and G. Van Assche, “Quantum distribution of Gaussian keys using squeezed states,” Phys. Rev. A 63, 052311 (2001).

[Crossref]

T. Symul, D.J. Alton, S. M. Assad, A. M. Lance, C. Weedbrook, T. C. Ralph, and P. K. Lam, “Experimental demonstration of post-selection-based continuous-variable quantum key distribution in the presence of Gaussian noise,” Phys. Rev. A 76, 030303(R) (2007).

[Crossref]

R. Namiki and T. Hirano, “Efficient-phase-encoding protocols for continuous-variable quantum key distribution using coherent states and postselection,” Phys. Rev. A 74, 032302 (2006).

[Crossref]

M. Heid and N. Lütkenhaus, “Security of coherent-state quantum cryptography in the presence of Gaussian noise,” Phys. Rev. A 76, 022313 (2007).

[Crossref]

A. Leverrier and P. Grangier, “Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation,” Phys. Rev. Lett. 102, 180504 (2009).

[Crossref]
[PubMed]

F. Grosshans, “Collective attacks and unconditional security in continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020504 (2005).

[Crossref]
[PubMed]

M. Navascués and A. Acín, “Security bounds for continuous variable quantum key distribution,” Phys. Rev. Lett. 94, 020505 (2005).

[Crossref]
[PubMed]

R. García-Patrón and N. J. Cerf, “Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution,” Phys. Rev. Lett. 97, 190503 (2006).

[Crossref]
[PubMed]

M. Navascués, F. Grosshans, and A. Acín, “Optimality of Gaussian attacks in continuous-variable quantum cryptography,” Phys. Rev. Lett. 97, 190502 (2006).

[Crossref]
[PubMed]

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

[Crossref]
[PubMed]

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, T. C. Ralph, and P. K. Lam, “No-switching quantum key distribution using broadband modulated coherent light,” Phys. Rev. Lett. 95, 180503 (2005).

[Crossref]
[PubMed]

S. L. Braunstein and P. Van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005).

[Crossref]

F. Grosshans and P. Grangier, “Reverse reconciliation protocols for quantum cryptography with continuous variables,” http://www.arxiv.org/abs/quant-ph/0204127v1.

M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, (Cambridge University Press, UK, 2000).

C. H. Bennett and G. Grassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, Newyork, 1984), 175–179.