From Bell's theorem to secure quantum key distribution, Phys. Rev. Lett, vol.97, p.120405, 2006. ,
Practical device-independent quantum cryptography via entropy accumulation, Nature Communications, vol.9, issue.1, p.459, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01992050
Side-channel-free quantum key distribution, Phys. Rev. Lett, vol.108, p.130502, 2012. ,
Detection-loophole-free test of quantum nonlocality, and applications. Physical review letters, vol.111, p.130406, 2013. ,
Quantum key distribution without detector vulnerabilities using optically seeded lasers, Nature Photon, vol.10, pp.312-315, 2016. ,
Distillation of secret key and entanglement from quantum states, Proc. R. Soc. Lond. A, vol.461, pp.207-235, 2005. ,
Background level and counter efficiencies required for a loophole-free einstein-podolsky-rosen experiment, Phys. Rev. A, vol.47, pp.747-750, 1993. ,
Quantum cryptography based on Bell's theorem, Phys. Rev. Lett, vol.67, pp.661-663, 1991. ,
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits, Phys. Rev. A, vol.88, p.52303, 2013. ,
Attacking quantum key distribution by light injection via ventilation openings, 2019. ,
Bell violation using entangled photons without the fair-sampling assumption, Nature, vol.497, issue.7448, p.227, 2013. ,
Significant-loophole-free test of Bell's theorem with entangled photons. Physical review letters, vol.115, p.250401, 2015. ,
Noisy preprocessing facilitates a photonic realization of device-independent quantum key distribution, Phys. Rev. Lett, vol.124, p.230502, 2020. ,
Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication, Phys. Rev. Lett, vol.95, p.80501, 2005. ,
Experimental measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.111, p.130502, 2013. ,
Deviceindependent quantum random-number generation, Nature, vol.562, issue.7728, p.548, 2018. ,
Measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.108, p.130503, 2012. ,
Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.4, pp.686-689, 2010. ,
Improved data post-processing in quantum key distribution and application to loss thresholds in device independent qkd, Quantum Inf. Comput, vol.12, pp.203-214, 2012. ,
Setting up experimental Bell test with reinforcement learning, 2020. ,
A trace inequality of John von Neumann, Monatshefte für Mathematik, vol.79, issue.4, pp.303-306, 1975. ,
Quantum Computation and Quantum Information: 10th Anniversary Edition, 2011. ,
Device-independent quantum key distribution secure against collective attacks, New Journal of Physics, vol.11, issue.4, p.45021, 2009. ,
Noisy processing and distillation of private quantum states, Phys. Rev. Lett, vol.98, p.20502, 2007. ,
Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, p.12332, 2005. ,
Real-world twophoton interference and proof-of-principle quantum key distribution immune to detector attacks, Phys. Rev. Lett, vol.111, p.130501, 2013. ,
Robust device-independent quantum key distribution, 2020. ,
Robust device-independent quantum key distribution, 2020. ,
Strong loophole-free test of local realism, Physical review letters, vol.115, issue.25, p.250402, 2015. ,
Randomness extraction from bell violation with continuous parametric down-conversion. Physical review letters, vol.121, p.150402, 2018. ,
Self-testing of quantum systems: a review, 2019. ,
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution, Phys. Rev. Lett, vol.112, p.190503, 2014. ,
What is the minimum CHSH score certifying that a state resembles the singlet? Quantum, vol.4, p.246, 2020. ,
Self-testing two-qubit maximally entangled states with two binary measurements, 2020. ,
Quantum eavesdropping without interception: an attack exploiting the dead time ,