T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

A. Leverrier, “Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017).

[Crossref]
[PubMed]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]

H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A (Coll. Park) 94(1), 012325 (2016).

[Crossref]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent States,” Phys. Rev. Lett. 114(7), 070501 (2015).

[Crossref]
[PubMed]

E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: principle, security and implementations,” Entropy (Basel) 17, 6072–6092 (2015).

[Crossref]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

R. Renner and J. I. Cirac, “De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102(11), 110504 (2009).

[Crossref]
[PubMed]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A (Coll. Park) 94(1), 012325 (2016).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

R. Renner and J. I. Cirac, “De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102(11), 110504 (2009).

[Crossref]
[PubMed]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: principle, security and implementations,” Entropy (Basel) 17, 6072–6092 (2015).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A (Coll. Park) 94(1), 012325 (2016).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

A. Leverrier, “Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017).

[Crossref]
[PubMed]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent States,” Phys. Rev. Lett. 114(7), 070501 (2015).

[Crossref]
[PubMed]

E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: principle, security and implementations,” Entropy (Basel) 17, 6072–6092 (2015).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A (Coll. Park) 94(1), 012325 (2016).

[Crossref]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

R. Renner and J. I. Cirac, “De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102(11), 110504 (2009).

[Crossref]
[PubMed]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

D. Huang, P. Huang, D. Lin, C. Wang, and G. Zeng, “High-speed continuous-variable quantum key distribution without sending a local oscillator,” Opt. Lett. 40(16), 3695–3698 (2015).

[Crossref]
[PubMed]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

D. Huang, J. Fang, C. Wang, P. Huang, and G. Zeng, “A 300-MHz bandwidth balanced homodyne detector for continuous variable quantum key distribution,” Chin. Phys. Lett. 30(11), 114209 (2013).

[Crossref]

E. Diamanti and A. Leverrier, “Distributing secret keys with quantum continuous variables: principle, security and implementations,” Entropy (Basel) 17, 6072–6092 (2015).

[Crossref]

P. Huang, D. Lin, D. Huang, and G. Zeng, “Security of continuous-variable quantum key distribution with imperfect phase compensation,” Int. J. Theor. Phys. 54(8), 2613–2622 (2015).

[Crossref]

P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,” Nat. Photonics 7(5), 378–381 (2013).

[Crossref]

F. Grosshans, G. Van Assche, J. Wenger, R. Brouri, N. J. Cerf, and P. Grangier, “Quantum key distribution using gaussian-modulated coherent states,” Nature 421(6920), 238–241 (2003).

[Crossref]
[PubMed]

Y. M. Chi, B. Qi, W. Zhu, L. Qian, H. K. Lo, S. H. Youn, A. I. Lvovsky, and L. Tian, “A balanced homodyne detector for high-rate gaussian-modulated coherent-state quantum key distribution,” New J. Phys. 13(1), 013003 (2011).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, H. Ma, S. Wang, and G. Zeng, “High key rate continuous-variable quantum key distribution with a real local oscillator,” Opt. Express 26(3), 2794–2806 (2018).

[Crossref]
[PubMed]

W. Liu, J. Peng, P. Huang, D. Huang, and G. Zeng, “Monitoring of continuous-variable quantum key distribution system in real environment,” Opt. Express 25(16), 19429–19443 (2017).

[Crossref]
[PubMed]

D. Huang, D. Lin, C. Wang, W. Liu, S. Fang, J. Peng, P. Huang, and G. Zeng, “Continuous-variable quantum key distribution with 1 Mbps secure key rate,” Opt. Express 23(13), 17511–17519 (2015).

[Crossref]
[PubMed]

P. Jouguet, S. Kunz-Jacques, E. Diamanti, and A. Leverrier, “Analysis of imperfection in practical continuous-variable quantum key distribution,” Phys. Rev. A 86(3), 032309 (2012).

[Crossref]

B. Qi, L. Huang, L. Qian, and H. K. Lo, “Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers,” Phys. Rev. A 76(5), 052323 (2007).

[Crossref]

P. Jouguet, S. Kunz-Jacques, and E. Diamanti, “Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution,” Phys. Rev. A 87(6), 062313 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, and L. M. Liang, “Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems,” Phys. Rev. A 88(2), 022339 (2013).

[Crossref]

J. Z. Huang, C. Weedbrook, Z. Q. Yin, S. Wang, H. W. Li, W. Chen, G. C. Guo, and Z. F. Han, “Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack,” Phys. Rev. A 87(6), 062329 (2013).

[Crossref]

X. C. Ma, S. H. Sun, M. S. Jiang, M. Gui, Y. L. Zhou, and L. M. Liang, “Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator,” Phys. Rev. A 89(3), 032310 (2014).

[Crossref]

A. Leverrier, F. Grosshans, and P. Grangier, “Finite-size analysis of a continuous-variable quantum key distribution,” Phys. Rev. A 81(6), 062343 (2010).

[Crossref]

H. Qin, R. Kumar, and R. Alléaume, “Quantum hacking: saturation attack on practical continuous-variable quantum key distribution,” Phys. Rev. A (Coll. Park) 94(1), 012325 (2016).

[Crossref]

P. Huang, J. Huang, T. Wang, H. Li, D. Huang, and G. Zeng, “Robust continuous-variable quantum key distribution against practical attacks,” Phys. Rev. A (Coll. Park) 95(5), 052302 (2017).

[Crossref]

T. Wang, P. Huang, Y. Zhou, W. Liu, and G. Zeng, “Pilot-multiplexed continuous-variable quantum key distribution with a real local oscillator,” Phys. Rev. A (Coll. Park) 97(1), 012310 (2018).

[Crossref]

A. Leverrier, “Composable security proof for continuous-variable quantum key distribution with coherent States,” Phys. Rev. Lett. 114(7), 070501 (2015).

[Crossref]
[PubMed]

R. Renner and J. I. Cirac, “De Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography,” Phys. Rev. Lett. 102(11), 110504 (2009).

[Crossref]
[PubMed]

F. Furrer, T. Franz, M. Berta, A. Leverrier, V. B. Scholz, M. Tomamichel, and R. F. Werner, “Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks,” Phys. Rev. Lett. 109(10), 100502 (2012).

[Crossref]
[PubMed]

A. Leverrier, R. García-Patrón, R. Renner, and N. J. Cerf, “Security of continuous-variable quantum key distribution against general attacks,” Phys. Rev. Lett. 110(3), 030502 (2013).

[Crossref]
[PubMed]

A. Leverrier, “Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction,” Phys. Rev. Lett. 118(20), 200501 (2017).

[Crossref]
[PubMed]

B. Qi, P. Lougovski, R. Pooser, W. Grice, and M. Bobrek, “Generating the local oscillator“locally”in continuous-variable quantum key distribution based on coherent detection,” Phys. Rev. X 5(4), 041009 (2015).

[Crossref]

D. B. S. Soh, C. Brif, P. J. Coles, N. Lütkenhaus, R. M. Camacho, J. Urayama, and M. Sarovar, “Self-referenced continuous-variable quantum key distribution protocol,” Phys. Rev. X 5(4), 041010 (2015).

[Crossref]

F. Grosshans, N. J. Cerf, J. Wenger, R. Tualle-Brouri, and P. Grangier, “Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables,” Quantum Inf. Comput. 3(7), 535–552 (2003).

C. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd, “Gaussian quantum information,” Rev. Mod. Phys. 84(2), 621–669 (2012).

[Crossref]

D. Huang, P. Huang, D. Lin, and G. Zeng, “Long-distance continuous-variable quantum key distribution by controlling excess noise,” Sci. Rep. 6(1), 19201 (2016).

[Crossref]
[PubMed]