S. Aaronson and A. Arkhipov, The computational complexity of linear optics, Proceedings of the 43rd annual ACM symposium on Theory of computing, STOC '11, pp.143-252, 2013.
DOI : 10.1145/1993636.1993682

D. Aharonov and L. Eldar, Quantum locally testable codes. arXiv preprint, 2013.
DOI : 10.1137/140975498

URL : http://arxiv.org/pdf/1310.5664

[. Acín, . Fritz, A. Leverrier, and . Sainz, A Combinatorial Approach to Nonlocality and Contextuality, Communications in Mathematical Physics, vol.110, issue.2, pp.533-628, 2015.
DOI : 10.1007/978-1-4613-8431-1

G. [. Bennett and . Brassard, Quantum cryptography: Public key distribution and coin tossing, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 1984.
DOI : 10.1016/j.tcs.2014.05.025

URL : https://doi.org/10.1016/j.tcs.2014.05.025

H. Buhrman, N. Chandran, S. Fehr, R. Gelles, and V. Goyal, Rafail Ostrovsky, and Christian Schaffner. Position-based quantum cryptography: Impossibility and constructions, Advances in Cryptology? CRYPTO 2011, pp.429-446, 2011.

J. Daniel and . Bernstein, Grover vs. McEliece, Post- Quantum Cryptography Proceedings, pp.73-80, 2010.

A. Matthew, A. Broome, S. Fedrizzi, J. Rahimi-keshari, S. Dove et al., Photonic boson sampling in a tunable circuit, Science, issue.6121, pp.339794-798, 2013.

M. Berta, F. Furrer, B. Volkher, and . Scholz, The smooth entropy formalism on von neumann algebras. arXiv preprint, 2011.
DOI : 10.1063/1.4936405

URL : http://arxiv.org/pdf/1107.5460.pdf

S. Beigi and R. König, Simplified instantaneous non-local quantum computation with applications to position-based cryptography, New Journal of Physics, vol.13, issue.9, p.93036, 2011.
DOI : 10.1088/1367-2630/13/9/093036

URL : http://iopscience.iop.org/article/10.1088/1367-2630/13/9/093036/pdf

M. Blum, How to prove a theorem so no one else can claim it, Proceedings of the International Congress of Mathematicians, p.2, 1986.

S. [. Buhrman and . Massar, Causality and Tsirelson's bounds, Physical Review A, vol.1509, issue.5, p.52103, 2005.
DOI : 10.1007/3-540-49208-9_4

[. Ben-or, S. Goldwasser, J. Kilian, and A. Wigderson, Multiprover interactive proofs: How to remove intractability assumptions, Proceedings of the twentieth annual ACM symposium on Theory of computing, pp.113-131, 1988.
DOI : 10.1145/62212.62223

E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, 10th Annual International Cryptology Conference Proceedings, pp.2-21, 1990.
DOI : 10.1007/3-540-38424-3_1

URL : http://www.crypto.nkfu.edu.tw/CRYPTO/biham.pdf

M. Bavarian and P. W. Shor, Information causality, szemeréditrotter and algebraic variants of chsh, Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15, pp.123-132, 2015.
DOI : 10.1145/2688073.2688112

URL : http://arxiv.org/pdf/1311.5186.pdf

E. Ben-sasson, P. Harsha, and S. Raskhodnikova, Some 3CNF Properties Are Hard to Test, SIAM Journal on Computing, vol.35, issue.1, pp.1-21, 2005.
DOI : 10.1137/S0097539704445445

URL : http://ttic.uchicago.edu/~prahladh/papers/BHR/BHR2005.pdf

D. Boneh and M. Zhandry, Quantum-Secure Message Authentication Codes, Advances in Cryptology -EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.592-608, 2013.
DOI : 10.1007/978-3-642-38348-9_35

URL : http://eprint.iacr.org/2012/606.pdf

D. Boneh and M. Zhandry, Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World, Advances in Cryptology - CRYPTO 2013 -33rd Annual Cryptology Conference Proceedings, Part II, pp.361-379, 2013.
DOI : 10.1007/978-3-642-40084-1_21

J. Patrick, M. Coles, M. Berta, S. Tomamichel, and . Wehner, Entropic uncertainty relations and their applications, 2015.

[. Chakraborty, A. Chailloux, and A. Leverrier, Arbitrarily Long Relativistic Bit Commitment, Physical Review Letters, vol.115, issue.25, p.250501, 2015.
DOI : 10.1103/RevModPhys.86.419

URL : https://hal.archives-ouvertes.fr/hal-01237241

[. Chakraborty, A. Chailloux, and A. Leverrier, Robust relativistic bit commitment, Physical Review A, vol.94, issue.6, p.62314, 2016.
DOI : 10.1103/PhysRevLett.117.140506

URL : https://hal.archives-ouvertes.fr/hal-01407421

[. Chandran, V. Goyal, R. Moriarty, and R. Ostrovsky, Position based cryptography, Advances in Cryptology-CRYPTO 2009, pp.391-407, 2009.
DOI : 10.1007/978-3-642-03356-8_23

R. [. Christandl, G. König, R. Mitchison, and . Renner, One-and-a-Half Quantum de Finetti Theorems, Communications in Mathematical Physics, vol.90, issue.2, pp.473-498, 2007.
DOI : 10.1007/s00220-007-0189-3

[. Christandl, R. König, and R. Renner, Postselection Technique for Quantum Channels with Applications to Quantum Cryptography, Physical Review Letters, vol.102, issue.2, p.20504, 2009.
DOI : 10.1103/PhysRevLett.68.557

URL : http://arxiv.org/pdf/0809.3019

[. Chakraborty and A. Leverrier, Practical position-based quantum cryptography, Physical Review A, vol.8, issue.5, p.52304, 2015.
DOI : 10.1103/PhysRevA.79.042306

URL : https://hal.archives-ouvertes.fr/hal-01237233

A. Chailloux and A. Leverrier, Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for $$\mathsf {NP}$$ Secure Against Quantum Adversaries, 2016.
DOI : 10.1109/18.796385

A. Crespi, R. Osellame, R. Ramponi, J. Daniel, . Brod et al., Integrated multimode interferometers with arbitrary designs for photonic boson sampling, Nature Photonics, vol.75, issue.7, p.545, 2013.
DOI : 10.1103/PhysRevLett.75.4337

C. Crépeau, L. Salvail, J. Simard, and A. Tapp, Two Provers in Isolation, Advances in Cryptology?ASIACRYPT 2011, pp.407-430, 2011.
DOI : 10.1007/978-3-642-25385-0_22

A. Cabello, S. Severini, and A. Winter, (non-) contextuality of physical theories as an axiom. arXiv preprint, 2010.

A. Cabello, S. Severini, and A. Winter, Graph-Theoretic Approach to Quantum Correlations, Physical Review Letters, vol.10, issue.4, p.40401, 2014.
DOI : 10.1007/BF01261326

[. Delfosse, Tradeoffs for reliable quantum information storage in surface codes and color codes, 2013 IEEE International Symposium on Information Theory, pp.917-921, 2013.
DOI : 10.1109/ISIT.2013.6620360

URL : https://hal.archives-ouvertes.fr/hal-00798030

I. Damgård, J. Funder, J. Buus-nielsen, and L. Salvail, Superposition Attacks on Cryptographic Protocols, Information Theoretic Security -7th International Conference, ICITS 2013 Proceedings, pp.142-161, 2013.
DOI : 10.1007/978-3-319-04268-8_9

E. Diamanti and A. Leverrier, Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations, Entropy, vol.91, issue.9, p.6072, 2015.
DOI : 10.1103/PhysRevA.91.042337

URL : https://hal.archives-ouvertes.fr/hal-01237232

C. Andrew, Y. Doherty, B. Liang, S. Toner, and . Wehner, The quantum moment problem and bounds on entangled multiprover games, Computational Complexity CCC'08. 23rd Annual IEEE Conference on, pp.199-210, 2008.

J. Edmonds, Paths, trees, and flowers, Journal canadien de math??matiques, vol.17, issue.0, pp.449-467, 1965.
DOI : 10.4153/CJM-1965-045-4

[. Eldar, W. Aram, and . Harrow, Local hamiltonians whose ground states are hard to approximate. arXiv preprint, 2015.
DOI : 10.1109/focs.2017.46

]. A. Eke91 and . Ekert, Quantum cryptography based on bell's theorem, Phys. Rev. Lett, vol.67, issue.6, pp.661-663, 1991.

M. Fbt-+-14-]-fabian-furrer, M. Berta, . Tomamichel, B. Volkher, M. Scholz et al., Position-momentum uncertainty relations in the presence of quantum memory, Journal of Mathematical Physics, issue.12, p.55122205, 2014.

S. Fehr and M. Fillinger, On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments
DOI : 10.1007/978-3-662-49896-5_17

F. Furrer, T. Franz, M. Berta, A. Leverrier, B. Volkher et al., Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks, Physical Review Letters, vol.109, issue.10, p.100502, 2012.
DOI : 10.1103/PhysRevLett.93.170504

A. Fine, Hidden Variables, Joint Probability, and the Bell Inequalities, Physical Review Letters, vol.18, issue.5, pp.291-295, 1982.
DOI : 10.1103/PhysRevD.18.349

[. Fritz, A. Leverrier, and A. B. Sainz, Probabilistic models on contextuality scenarios, Proceedings of the 10th International Workshop on Quantum Physics and Logic, 2013.
DOI : 10.1103/PhysRevLett.110.260406

URL : https://hal.archives-ouvertes.fr/hal-00931584

H. Michael, . Freedman, A. David, F. Meyer, and . Luo, Z2-systolic freedom and quantum codes Mathematics of quantum computation, pp.287-320, 2002.

T. Fritz, A. B. Sainz, R. Augusiak, J. Bohr-brask, R. Chaves et al., Local orthogonality as a multipartite principle for quantum correlations, Nature Communications, vol.3, pp.4-2263
DOI : 10.1103/PhysRevA.87.012128

URL : https://hal.archives-ouvertes.fr/hal-00917114

D. Gottesman, L. Isaac, and . Chuang, Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations, Nature, vol.52, issue.6760, pp.390-393, 1999.
DOI : 10.1103/PhysRevA.52.3489

. Gcw-+-03-]-f, N. J. Grosshans, J. Cerf, R. Wenger, P. Tualle-brouri et al., Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables, QIC, issue.3, pp.535-552, 2003.

]. F. Gg02a, P. Grosshans, and . Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables. Arxiv preprint quant- ph, 2002.

[. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, GHLS14] Sevag Gharibian, Yichen Huang, Zeph Landau, and Seung Woo Shin. Quantum Hamiltonian complexity. arXiv preprint, p.57902, 2002.
DOI : 10.1103/PhysRevLett.84.4002

URL : https://hal.archives-ouvertes.fr/hal-00509124

L. Guth and A. Lubotzky, Quantum error correcting codes and 4-dimensional arithmetic hyperbolic manifolds, Journal of Mathematical Physics, vol.5557, issue.3, p.82202, 2014.
DOI : 10.1007/978-3-642-01877-0_21

URL : http://arxiv.org/pdf/1310.5555

[. Goldreich, Short Locally Testable Codes and Proofs: A Survey in Two Parts, Property testing, pp.65-104, 2010.
DOI : 10.1145/1250790.1250830

D. Gottesman, Stabilizer codes and quantum error correction, 1997.

D. Gottesman, Stabilizer codes and quantum error correction, 1997.

[. Gottesman, Fault-tolerant quantum computation with constant overhead, Quantum Information & Computation, vol.14, pp.15-161338, 2014.

N. J. García-patrón and . Cerf, Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution, Physical Review Letters, vol.97, issue.19, 2006.
DOI : 10.1103/PhysRevLett.96.080502

K. Lov and . Grover, A fast quantum mechanical algorithm for database search, Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp.212-219, 1996.

[. Gallego, L. E. Würflinger, A. Acín, and M. Navascués, Quantum Correlations Require Multipartite Information Principles, Physical Review Letters, vol.1, issue.21, p.210403, 2011.
DOI : 10.1103/PhysRevLett.104.230404

W. Aram and . Harrow, The church of the symmetric subspace. arXiv preprint, 2013.

B. Matthew and . Hastings, Decoding in hyperbolic spaces: quantum LDPC codes with linear rate and efficient error correction, Quantum Information & Computation, vol.14, pp.13-141187, 2014.

[. Hastings, Quantum codes from high-dimensional manifolds. arXiv preprint, 2016.

[. Helgason, Differential geometry, Lie groups, and symmetric spaces Academic press, 1979.
DOI : 10.1090/gsm/034

[. Hong, L. Ou, and . Mandel, Measurement of subpicosecond time intervals between two photons by interference, Physical Review Letters, vol.130, issue.18, pp.2044-2046, 1987.
DOI : 10.1103/PhysRev.130.2529

[. Howard, Maximum nonlocality and minimum uncertainty using magic states, Physical Review A, vol.375, issue.376, p.42103, 2015.
DOI : 10.1103/PhysRevA.83.032310

S. Ishizaka and T. Hiroshima, Asymptotic teleportation scheme as a universal programmable quantum processor. Physical review letters, p.240501, 2008.
DOI : 10.1103/physrevlett.101.240501

URL : http://arxiv.org/pdf/0807.4568

[. Jouguet, S. Kunz-jacques, E. Diamanti, and A. Leverrier, Analysis of imperfections in practical continuous-variable quantum key distribution, Physical Review A, vol.86, issue.3, p.32309, 2012.
DOI : 10.1103/PhysRevA.72.050303

URL : https://hal.archives-ouvertes.fr/hal-00727095

A. Kent, Unconditionally Secure Bit Commitment, Physical Review Letters, vol.56, issue.7, pp.1447-1450, 1999.
DOI : 10.1103/PhysRevA.56.1154

A. Kent, Secure Classical Bit Commitment Using Fixed Capacity Communication Channels, Journal of Cryptology, vol.18, issue.4, pp.313-335, 2005.
DOI : 10.1007/s00145-005-0905-8

URL : http://arxiv.org/pdf/quant-ph/9906103

A. Kent, Unconditionally secure bit commitment with flying qudits, New Journal of Physics, vol.13, issue.11, p.113015, 2011.
DOI : 10.1088/1367-2630/13/11/113015

URL : http://iopscience.iop.org/article/10.1088/1367-2630/13/11/113015/pdf

A. Kent, Quantum tasks in Minkowski space, Classical and Quantum Gravity, vol.29, issue.22, p.224013, 2012.
DOI : 10.1088/0264-9381/29/22/224013

A. Kent, Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes, Physical Review Letters, vol.109, issue.13, p.130501, 2012.
DOI : 10.1103/PhysRevA.84.012326

URL : http://arxiv.org/pdf/1108.2879

[. Kaplan and G. Leurent, Anthony Leverrier, and María Naya- Plasencia. Breaking symmetric cryptosystems using quantum period finding, Annual Cryptology Conference, pp.207-237, 2016.

[. Kaplan and G. Leurent, Anthony Leverrier, and María Naya- Plasencia. Quantum differential and linear cryptanalysis, IACR Transactions on Symmetric Cryptology, vol.2016, issue.1, pp.71-94, 2016.

A. Kent, J. William, T. P. Munro, and . Spiller, Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints, Physical Review A, vol.84, issue.1, p.12326, 2011.
DOI : 10.1103/PhysRevA.83.012322

URL : http://arxiv.org/pdf/1008.2147

A. Alexey, . Kovalev, P. Leonid, and . Pryadko, Fault tolerance of quantum lowdensity parity check codes with sublinear distance scaling, Physical Review A, vol.87, issue.2, p.20304, 2013.

[. König, R. Renner, and C. Schaffner, The operational meaning of min-and max-entropy. Information Theory, IEEE Transactions on, vol.55, issue.9, pp.4337-4347, 2009.

[. Kaniewski, M. Tomamichel, E. Hanggi, and S. Wehner, Secure bit commitment from relativistic constraints. Information Theory, IEEE Transactions on, vol.59, issue.7, pp.4687-4699, 2013.
DOI : 10.1109/tit.2013.2247463

URL : http://arxiv.org/pdf/1206.1740.pdf

M. Laurent, Sums of Squares, Moment Matrices and Optimization Over Polynomials, Emerging applications of algebraic geometry, pp.157-270, 2009.
DOI : 10.1007/978-0-387-09686-5_7

J. Lodewyck, M. Bloch, R. García-patrón, S. Fossier, E. Karpov et al., Quantum key distribution over 25 km with an all-fiber continuous-variable system, Phys. Rev. A, vol.76, issue.4, 2007.
DOI : 10.1103/physreva.76.042305

URL : http://arxiv.org/pdf/0706.4255

H. Lo and H. F. Chau, Is Quantum Bit Commitment Really Possible?, Physical Review Letters, vol.78, issue.17, pp.3410-3413, 1997.
DOI : 10.1103/PhysRevLett.78.3414

URL : http://arxiv.org/pdf/quant-ph/9603004v1.pdf

A. Leverrier, Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States, Physical Review Letters, vol.114, issue.7, p.70501, 2015.
DOI : 10.1103/PhysRevLett.84.2722

URL : https://hal.archives-ouvertes.fr/hal-01092234

A. Leverrier, su(p, q) coherent states and gaussian de finetti theorems . arXiv preprint, 2016.

A. Leverrier, Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction, Physical Review Letters, vol.118, issue.20, 2017.
DOI : 10.1038/ncomms1631

A. Leverrier and R. García-patrón, Analysis of circuit imperfections in bosonsampling, Quantum Information & Computation, vol.15, issue.5- 6, pp.489-0512, 2015.
URL : https://hal.archives-ouvertes.fr/hal-00931587

[. Leverrier, R. García-patrón, R. Renner, and N. J. Cerf, Security of Continuous-Variable Quantum Key Distribution Against General Attacks, Physical Review Letters, vol.3, issue.3, p.30502, 2013.
DOI : 10.1103/PhysRevA.80.010102

URL : https://hal.archives-ouvertes.fr/hal-00917115

. Lkb-+-13-]-t, J. Lunghi, F. Kaniewski, R. Bussières, M. Houlmann et al., Experimental bit commitment based on quantum communication and special relativity, Phys. Rev. Lett, vol.111, p.180504, 2013.

. Lkb-+-15-]-t, J. Lunghi, F. Kaniewski, R. Bussières, M. Houlmann et al., Practical relativistic bit commitment, Phys. Rev. Lett, vol.115, p.30502, 2015.

E. [. Leverrier, P. Karpov, N. J. Grangier, and . Cerf, Security of continuousvariable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space, New J. Phys, issue.11, p.11115009, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00554926

. Hoi-kwan, H. Lau, and . Lo, Insecurity of position-based quantumcryptography protocols against entanglement attacks, Physical Review A, vol.83, issue.1, p.12322, 2011.

[. Leverrier, J. Tillich, and G. Zémor, Quantum Expander Codes, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pp.810-824, 2015.
DOI : 10.1109/FOCS.2015.55

URL : https://hal.archives-ouvertes.fr/hal-01244657

A. Robert and . Malaney, Quantum location verification in noisy channels. arXiv preprint, 2010.

[. Mayers, Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.63, issue.17, pp.3414-3417, 1997.
DOI : 10.1007/BF01449770

URL : http://arxiv.org/pdf/quant-ph/9605044v1.pdf

G. Plinio and . Murillo, Systole of congruence coverings of arithmetic hyperbolic manifolds. arXiv preprint, 2016.

F. Navascués, A. Grosshans, and . Acín, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, p.190502, 2006.
DOI : 10.1103/PhysRevLett.94.020505

S. Navascués, A. Pironio, and . Acín, Bounding the Set of Quantum Correlations, Physical Review Letters, vol.98, issue.1, p.10401, 2007.
DOI : 10.1103/PhysRevLett.97.170409

M. Navascués and H. Wunderlich, A glance beyond the quantum model, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.1, issue.7267, pp.881-890, 2010.
DOI : 10.1007/978-3-540-45230-0_3

L. Jeremy, A. O-'brien, J. Furusawa, and . Vu?kovi?, Photonic quantum technologies, Nature Photonics, vol.3, issue.12, pp.687-695, 2009.

D. Poulin and Y. Chung, On the iterative decoding of sparse quantum codes, Quantum Information and Computation, vol.8, p.987, 2008.

[. Perelomov, Coherent states for arbitrary Lie group, Communications in Mathematical Physics, vol.6, issue.3, pp.222-236, 1972.
DOI : 10.1007/BF01645091

URL : http://arxiv.org/pdf/math-ph/0203002

A. Perelomov, Generalized coherent states and their applications, 1986.
DOI : 10.1007/978-3-642-61629-7

[. Pironio, M. Navascués, and A. Acin, Convergent Relaxations of Polynomial Optimization Problems with Noncommuting Variables, SIAM Journal on Optimization, vol.20, issue.5, pp.2157-2180, 2010.
DOI : 10.1137/090760155

T. Ppk-+-09-]-marcin-pawlowski, D. Paterek, V. Kaszlikowski, A. Scarani, M. Winter et al., Information causality as a physical principle, Nature, vol.4, issue.7267, pp.1101-1104, 2009.
DOI : 10.1038/nature08400

C. Portmann and R. Renner, Cryptographic security of quantum key distribution. arXiv preprint, 2014.

P. Qi, R. Lougovski, W. Pooser, M. Grice, and . Bobrek, Generating the Local Oscillator ???Locally??? in Continuous-Variable Quantum Key Distribution Based on Coherent Detection, Physical Review X, vol.5, issue.4, p.41009, 2015.
DOI : 10.1088/0953-4075/42/11/114014

]. T. Ral99 and . Ralph, Continuous variable quantum cryptography, Phys. Rev. A, vol.61, issue.1, p.10303, 1999.

[. Ramanathan, R. Augusiak, and G. Murta, outcomes and the task of nonlocal computation, Physical Review A, vol.13, issue.2, p.22333, 2016.
DOI : 10.1103/PhysRevA.93.022305

J. [. Renner and . Cirac, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Physical Review Letters, vol.7, issue.11, p.110504, 2009.
DOI : 10.1103/PhysRevLett.101.093601

URL : http://arxiv.org/pdf/0809.2243

]. R. Ren07 and . Renner, Symmetry of large physical systems implies independence of subsystems, Nat. Phys, vol.3, issue.9, pp.645-649, 2007.

R. Renner, SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.45, issue.01, pp.1-127, 2008.
DOI : 10.1145/1008908.1008920

URL : https://hal.archives-ouvertes.fr/hal-00917115

J. Ribeiro and F. Grosshans, A tight lower bound for the bb84-states quantum-position-verification protocol, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01164727

P. Peter and . Rohde, Optical quantum computing with photons of arbitrarily low fidelity and purity, Physical Review A, vol.86, issue.5, p.52321, 2012.

P. Peter, . Rohde, C. Timothy, and . Ralph, Error tolerance of the bosonsampling model for linear optics quantum computing, Physical Review A, vol.85, issue.2, p.22332, 2012.

A. [. Rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Reck, A. Zeilinger, J. Herbert, P. Bernstein, and . Bertani, Experimental realization of any discrete unitary operator, Physical Review Letters, vol.262, issue.1, p.58, 1994.
DOI : 10.1126/science.262.5135.877

B. Daniel, C. Soh, . Brif, J. Patrick, N. Coles et al., Self-referenced continuous-variable quantum key distribution protocol, Physical Review X, vol.5, issue.4, p.41010, 2015.

H. Valerio-scarani, N. J. Bechmann-pasquinucci, M. Cerf, and . Du?ek, The security of practical quantum key distribution, Reviews of Modern Physics, vol.54, issue.3, p.1301, 2009.
DOI : 10.1063/1.2190466

S. Scheel, Permanents in linear optical networks. arXiv preprint quant- ph/0406127, 2004.

. B. Sfa-+-13-]-a, T. Sainz, R. Fritz, J. Augusiak, R. Bohr-brask et al., Exploring the local orthogonality principle. arXiv preprint, 2013.

A. Belén-sainz, T. Fritz, R. Augusiak, R. Bohr-brask, A. Chaves et al., Exploring the local orthogonality principle, Physical Review A, vol.8, issue.3, p.32117, 2014.
DOI : 10.1088/1751-8113/43/38/385303

W. Peter and . Shor, Algorithms for quantum computation: Discrete logarithms and factoring, IEEE Symposium on Foundations of Computer Science, pp.124-134, 1994.

R. Daniel and . Simon, On the power of quantum computation, SIAM journal on computing, vol.26, issue.5, pp.1474-1483, 1997.

J. Simard, Classical and quantum strategies for bit commitment schemes in the two-prover model, 2007.

M. Sipser, A. Daniel, and . Spielman, Expander codes, IEEE Transactions on Information Theory, vol.42, issue.6, pp.1710-1722, 1996.
DOI : 10.1109/18.556667

[. Tomamichel, R. Colbeck, and R. Renner, A fully quantum asymptotic equipartition property. Information Theory, IEEE Transactions on, vol.55, issue.12, pp.5840-5847, 2009.
DOI : 10.1109/tit.2009.2032797

URL : http://arxiv.org/pdf/0811.1221

M. Tillmann, B. Daki?, R. Heilmann, S. Nolte, A. Szameit et al., Experimental boson sampling, Nature Photonics, vol.339, issue.7, p.540, 2013.
DOI : 10.1126/science.1231440

M. Tomamichel, S. Fehr, J. Kaniewski, and S. Wehner, One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games, Advances in Cryptology?EUROCRYPT 2013, pp.609-625, 2013.
DOI : 10.1007/978-3-642-38348-9_36

M. Tomamichel and A. Leverrier, A rigorous and complete proof of finite key security of quantum key distribution. arXiv preprint, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01237240

[. Tomamichel, C. C. , W. Lim, N. Gisin, and R. Renner, Tight finite-key analysis for quantum cryptography, Nature Communications, vol.41, p.634, 2012.
DOI : 10.1109/18.476316

URL : http://www.nature.com/articles/ncomms1631.pdf

M. Tomamichel and R. Renner, Uncertainty relation for smooth entropies. Physical review letters, p.110506, 2011.
DOI : 10.1103/physrevlett.106.110506

URL : http://arxiv.org/pdf/1009.2015

A. Joel and . Tropp, User-friendly tail bounds for sums of random matrices, Foundations of Computational Mathematics, vol.12, issue.4, pp.389-434, 2012.

C. [. Tomamichel, A. Schaffner, R. Smith, and . Renner, Leftover hashing against quantum side information. Information Theory, IEEE Transactions on, vol.57, issue.8, pp.5524-5535, 2011.
DOI : 10.1109/tit.2011.2158473

URL : http://arxiv.org/pdf/1002.2436

[. Tillich and G. Zémor, Quantum LDPC Codes With Positive Rate and Minimum Distance Proportional to the Square Root of the Blocklength, IEEE Transactions on Information Theory, vol.60, issue.2, pp.1193-1202, 2014.
DOI : 10.1109/TIT.2013.2292061

URL : https://hal.archives-ouvertes.fr/hal-00931764

D. Unruh, Quantum Proofs of Knowledge, Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, pp.135-152, 2012.
DOI : 10.1007/978-3-642-29011-4_10

URL : http://eprint.iacr.org/2010/212.pdf

D. Unruh, Quantum Position Verification in the Random Oracle Model, Advances in Cryptology?CRYPTO 2014, pp.1-18, 2014.
DOI : 10.1007/978-3-662-44381-1_1

L. Vaidman, Instantaneous Measurement of Nonlocal Variables, Physical Review Letters, vol.69, issue.1, p.10402, 2003.
DOI : 10.1103/PhysRevA.61.052108

URL : http://arxiv.org/pdf/quant-ph/0111124

. Vmh-+-16-]-ephanielle, A. Verbanis, and . Martin, Raphaël Houlmann, Gianluca Boso, Félix Bussières, and Hugo Zbinden. 24-hour relativistic bit commitment, Physical Review Letters, vol.117, issue.14, p.140506, 2016.

J. Watrous, Theory of quantum information, 2016.

M. M. Wolf, G. Giedke, and J. I. Cirac, Extremality of Gaussian Quantum States, Physical Review Letters, vol.10, issue.8, p.80502, 2006.
DOI : 10.1103/PhysRevLett.94.150503

A. Wilce, Test spaces. Handbook of quantum logic and quantum structures: quantum logic, p.443, 2009.

[. Winter, Coding theorem and strong converse for quantum channels, IEEE Transactions on Information Theory, vol.45, issue.7, pp.2481-2485, 1999.
DOI : 10.1109/18.796385

URL : http://arxiv.org/pdf/1409.2536.pdf

A. M. Lance, P. Warwick, T. Bowen, T. C. Symul, P. K. Ralph et al., Quantum cryptography without switching, Phys. Rev. Lett, vol.93, issue.17, p.170504, 2004.

[. Zhandry, How to Construct Quantum Random Functions, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp.679-687, 2012.
DOI : 10.1109/FOCS.2012.37