A. Acín, N. Gisin, and L. Masanes, From Bell's theorem to secure quantum key distribution, Phys. Rev. Lett, vol.97, p.120405, 2006.

R. Arnon-friedman, F. Dupuis, O. Fawzi, R. Renner, and T. Vidick, Practical device-independent quantum cryptography via entropy accumulation, Nature Communications, vol.9, issue.1, p.459, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01992050

L. Samuel, S. Braunstein, and . Pirandola, Side-channel-free quantum key distribution, Phys. Rev. Lett, vol.108, p.130502, 2012.

. Bg-christensen, . Mccusker, . Altepeter, T. Calkins, A. E. Gerrits et al., Detection-loophole-free test of quantum nonlocality, and applications. Physical review letters, vol.111, p.130406, 2013.

L. Comandar, M. Lucamarini, and B. , Quantum key distribution without detector vulnerabilities using optically seeded lasers, Nature Photon, vol.10, pp.312-315, 2016.

I. Devetak and A. Winter, Distillation of secret key and entanglement from quantum states, Proc. R. Soc. Lond. A, vol.461, pp.207-235, 2005.

P. H. Eberhard, Background level and counter efficiencies required for a loophole-free einstein-podolsky-rosen experiment, Phys. Rev. A, vol.47, pp.747-750, 1993.

A. K. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett, vol.67, pp.661-663, 1991.

T. Ferreira-da-silva, D. Vitoreti, G. B. Xavier, G. C. Amaral, G. P. Temporão et al., Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits, Phys. Rev. A, vol.88, p.52303, 2013.

J. Garcia-escartin, S. Sajeed, and V. Makarov, Attacking quantum key distribution by light injection via ventilation openings, 2019.

M. Giustina, A. Mech, S. Ramelow, B. Wittmann, J. Kofler et al., Bell violation using entangled photons without the fair-sampling assumption, Nature, vol.497, issue.7448, p.227, 2013.

M. Giustina, A. M. Marijn, S. Versteegh, J. Wengerowsky, A. Handsteiner et al., Significant-loophole-free test of Bell's theorem with entangled photons. Physical review letters, vol.115, p.250401, 2015.

M. Ho, P. Sekatski, E. Y. Tan, R. Renner, J. Bancal et al., Noisy preprocessing facilitates a photonic realization of device-independent quantum key distribution, Phys. Rev. Lett, vol.124, p.230502, 2020.

B. Kraus, N. Gisin, and R. Renner, Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication, Phys. Rev. Lett, vol.95, p.80501, 2005.

Y. Liu, T. Chen, L. Wang, H. Liang, G. Shentu et al., Experimental measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.111, p.130502, 2013.

Y. Liu, Q. Zhao, M. Li, J. Guan, Y. Zhang et al., Deviceindependent quantum random-number generation, Nature, vol.562, issue.7728, p.548, 2018.

H. Lo, M. Curty, and B. Qi, Measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.108, p.130503, 2012.

L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar et al., Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.4, pp.686-689, 2010.

X. Ma and N. Lütkenhaus, Improved data post-processing in quantum key distribution and application to loss thresholds in device independent qkd, Quantum Inf. Comput, vol.12, pp.203-214, 2012.

A. Alexey, P. Melnikov, N. Sekatski, and . Sangouard, Setting up experimental Bell test with reinforcement learning, 2020.

L. Mirsky, A trace inequality of John von Neumann, Monatshefte für Mathematik, vol.79, issue.4, pp.303-306, 1975.

A. Michael, I. L. Nielsen, and . Chuang, Quantum Computation and Quantum Information: 10th Anniversary Edition, 2011.

S. Pironio, A. Acin, N. Brunner, N. Gisin, S. Massar et al., Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, p.45021, 2009.

M. Joseph, G. Renes, and . Smith, Noisy processing and distillation of private quantum states, Phys. Rev. Lett, vol.98, p.20502, 2007.

R. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005.

A. Rubenok, J. A. Slater, P. Chan, I. Lucio-martinez, and W. Tittel, Real-world twophoton interference and proof-of-principle quantum key distribution immune to detector attacks, Phys. Rev. Lett, vol.111, p.130501, 2013.

R. Schwonnek, K. Goh, I. W. Primaatmaja, E. Y. -z.-tan, R. Wolf et al., Robust device-independent quantum key distribution, 2020.

R. Schwonnek, K. Tong-goh, I. W. Primaatmaja, Y. Ernest, R. Tan et al., Robust device-independent quantum key distribution, 2020.

K. Lynden, E. Shalm, . Meyer-scott, G. Bradley, P. Christensen et al., Strong loophole-free test of local realism, Physical review letters, vol.115, issue.25, p.250402, 2015.

L. Shen, J. Lee, J. Bancal, A. Cerè, A. Lamas-linares et al., Randomness extraction from bell violation with continuous parametric down-conversion. Physical review letters, vol.121, p.150402, 2018.

J. Ivan?upi? and . Bowles, Self-testing of quantum systems: a review, 2019.

Z. Tang, Z. Liao, F. Xu, B. Qi, L. Qian et al., Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.112, p.190503, 2014.

X. Valcarce, P. Sekatski, D. Orsucci, E. Oudot, J. Bancal et al., What is the minimum CHSH score certifying that a state resembles the singlet? Quantum, vol.4, p.246, 2020.

X. Valcarce, J. Zivy, N. Sangouard, and P. Sekatski, Self-testing two-qubit maximally entangled states with two binary measurements, 2020.

H. Weier, H. Krauss, M. Rau, M. Fürst, S. Nauerth et al., Quantum eavesdropping without interception: an attack exploiting the dead time