G. Réconciliation-de-variables, 108 4.3.1 Choix des codes pour la réconciliation de type

H. Charles, G. Bennett, and . Brassard, Quantum Cryptography : Public Key Distribution and Coin Tossing, Proc. IEEE International Conference on Computer Systems and Signal Processing, pp.175-179, 1984.

A. K. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991.
DOI : 10.1103/PhysRevLett.67.661

G. Ribordy, J. Gautier, and N. Gisin, Automated ???plug & play??? quantum key distribution, Electronics Letters, vol.34, issue.22, pp.2116-2117, 1998.
DOI : 10.1049/el:19981473

A. Argyris, D. Syvridis, L. Larger, P. Valerio-annovazzi-lodi, I. Colet et al., Chaos-based communications at high bit rates using commercial fibre-optic links, Nature, vol.29, issue.4, pp.343-346, 2005.
DOI : 10.1038/nature04275

URL : https://hal.archives-ouvertes.fr/hal-00095452

B. Laszlo and . Kish, Totally secure classical communication utilizing johnson (-like) noise and kirchoff's law, Phys. Lett. A, vol.352, issue.3, pp.178-182, 2006.

E. Corndorf, G. Barbosa, C. Liang, H. P. Yuen, and P. Kumar, High-speed data encryption over 25 km of fiber by two-mode coherent-state quantum cryptography, Optics Letters, vol.28, issue.21, pp.2040-2042, 2003.
DOI : 10.1364/OL.28.002040

L. H. Ozarow and A. D. Wyner, Wire-Tap Channel II, AT&T Bell Laboratories Technical Journal, vol.63, issue.10, pp.2135-2157, 1984.
DOI : 10.1002/j.1538-7305.1984.tb00072.x

A. J. Menezes, P. C. Van-oorschot, and A. Scott, Vanstone : Handbook of applied cryptography, 1996.

M. Bellare and P. Rogaway, Introduction to modern cryptography Available online, 2005.

A. Hodjat and I. Verbauwhede, Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors, IEEE Transactions on Computers, vol.55, issue.4, pp.366-372, 2006.
DOI : 10.1109/TC.2006.49

M. Thomas, . Cover, and A. Joy, Thomas : Elements of Information Theory, 2006.

C. E. Shannon, A Mathematical Theory of Communication. The Bell System Technical Journal, pp.379-423623, 1948.

I. Csiszár and J. Körner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

. Merolla, Applications of ldpc codes to the wiretap channel, IEEE Trans. Inf. Theory, vol.53, issue.8, pp.2933-2945, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00336754

F. Grosshans, G. Van-assche, J. Wenger, R. Brouri, N. J. Cerf et al., Quantum key distribution using gaussian-modulated coherent states, Nature, vol.421, issue.6920, pp.238-241, 2003.
DOI : 10.1038/nature01289

URL : https://hal.archives-ouvertes.fr/hal-00509181

D. Slepian and K. Jack, Noiseless coding of correlated information sources, IEEE Transactions on Information Theory, vol.19, issue.4, pp.471-480, 1973.
DOI : 10.1109/TIT.1973.1055037

S. Lin and D. J. Costello, Error Control Coding, 2004.

G. Brassard and L. , Salvail : Secret-key Reconciliation by Public Discussion, T. Helleseth, ´ editeur : Advances in Cryptology-Eurocrypt'93, pp.411-423

G. Van-assche, J. Cardinal, and N. J. Cerf, Reconciliation of a Quantum-Distributed Gaussian Key, IEEE Transactions on Information Theory, vol.50, issue.2, pp.394-400, 2004.
DOI : 10.1109/TIT.2003.822618

C. G. Donahue, Peterson : Fast, efficient error reconciliation for quantum cryptography, Phys. Rev. A, vol.67, issue.5, pp.52303-52304, 2003.

J. L. Carter and M. N. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979.
DOI : 10.1016/0022-0000(79)90044-8

M. N. Wegman and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981.
DOI : 10.1016/0022-0000(81)90033-7

C. H. Bennett, G. Brassard, C. Crépeau, and U. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1915-1923, 1995.
DOI : 10.1109/18.476316

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.649.8666

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, pp.145-195, 2002.
DOI : 10.1103/RevModPhys.74.145

W. K. Wooters and W. H. , A single quantum cannot be cloned, Nature, vol.15, issue.5886, pp.802-803, 1982.
DOI : 10.1038/299802a0

W. Peter, J. Shor, and . Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Phys. Rev. Lett, vol.85, issue.2, pp.441-444, 2000.

C. H. Bennett, G. Brassard, and N. David-mermin, Quantum cryptography without Bell???s theorem, Physical Review Letters, vol.68, issue.5, pp.557-559, 1992.
DOI : 10.1103/PhysRevLett.68.557

C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Physical Review Letters, vol.68, issue.21, pp.3121-3124, 1992.
DOI : 10.1103/PhysRevLett.68.3121

Z. Quan and T. Chaojing, Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol, Physical Review A, vol.65, issue.6, pp.62301-62302, 2002.
DOI : 10.1103/PhysRevA.65.062301

K. Tamaki, M. Koashi, and N. Imoto, Unconditionally Secure Key Distribution Based on Two Nonorthogonal States, Physical Review Letters, vol.90, issue.16, pp.167904-167905, 2003.
DOI : 10.1103/PhysRevLett.90.167904

K. Tamaki and N. Lütkenhaus, Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel, Physical Review A, vol.69, issue.3, pp.32316-32317, 2004.
DOI : 10.1103/PhysRevA.69.032316

M. Koashi, Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference Pulse, Physical Review Letters, vol.93, issue.12, pp.120501-120502, 2004.
DOI : 10.1103/PhysRevLett.93.120501

K. Tamaki, N. L¨utkenhaus, M. Koashi, and J. Batuwantudawe, Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse, Physical Review A, vol.80, issue.3, p.607082
DOI : 10.1103/PhysRevA.80.032302

D. Bruss, Optimal Eavesdropping in Quantum Cryptography with Six States, Physical Review Letters, vol.81, issue.14, pp.3018-3021, 1998.
DOI : 10.1103/PhysRevLett.81.3018

B. Huttner, N. Imoto, N. Gisin, and T. Mor, Quantum cryptography with coherent states, Physical Review A, vol.51, issue.3, pp.1863-1869, 1995.
DOI : 10.1103/PhysRevA.51.1863

L. Duraffourg, J. Merolla, J. Goedgebuer, Y. Mazurenko, and W. T. Rhodes, Compact transmission system using single-sideband modulation of light for quantum cryptography, Optics Letters, vol.26, issue.18, pp.1427-1429, 2001.
DOI : 10.1364/OL.26.001427

T. Debuisschert and W. Boucher, Time coding protocols for quantum key distribution, Physical Review A, vol.70, issue.4, pp.42306-42307, 2004.
DOI : 10.1103/PhysRevA.70.042306

W. Boucher and T. Debuisschert, Experimental implementation of time-coding quantum key distribution, Physical Review A, vol.72, issue.6, pp.62325-62326, 2005.
DOI : 10.1103/PhysRevA.72.062325

D. Stucki, N. Brunner, N. Gisin, V. Scarani, and H. Zbinden, Fast and simple one-way quantum key distribution, Applied Physics Letters, vol.87, issue.19, pp.1-3, 2005.
DOI : 10.1063/1.2126792

URL : http://arxiv.org/abs/quant-ph/0506097

A. Beveratos, R. Brouri, T. Gacoin, A. Villing, J. Poizat et al., Single Photon Quantum Cryptography, Physical Review Letters, vol.89, issue.18, pp.187901-187902, 2002.
DOI : 10.1103/PhysRevLett.89.187901

URL : https://hal.archives-ouvertes.fr/hal-00509134

J. Richard, J. E. Hughes, D. Nordholt, . Derkacs, G. Charles et al., Practical free-space quantum key distribution over 10 km in daylight and at night, New Jour. Phys, vol.4, pp.43-44, 2002.

K. J. Gordon, V. Fernandez, G. S. Buller, I. Rech, S. D. Cova et al., Quantum key distribution system clocked at 2 GHz, Optics Express, vol.13, issue.8, pp.3015-3020, 2005.
DOI : 10.1364/OPEX.13.003015

URL : http://arxiv.org/abs/quant-ph/0605076

C. Kurtsiefer, P. Zarda, M. Halder, H. Weinfurter, P. M. Gormanand et al., Quantum cryptography: A step towards global key distribution, Nature, vol.5, issue.6906, p.450, 2002.
DOI : 10.1088/1367-2630/4/1/343

R. Alléaume, . Treussart, Y. Messin, J. Dumeige, . Roch et al., Experimental open-air quantum key distribution with a single-photon source, New Journal of Physics, vol.6, p.92, 2004.
DOI : 10.1088/1367-2630/6/1/092

A. Poppe, A. Fedrizzi, R. Ursin, H. R. Bohm, T. Lorunser et al., Jennewein et A. Zeilinger : Practical quantum key distribution with polarization entangled photons, Opt. Expr, issue.16, pp.123865-3871, 2004.

C. Peng, T. Yang, X. Bao, J. Zhang, F. Xian-min-jin et al., Experimental Free-Space Distribution of Entangled Photon Pairs Over 13??km: Towards Satellite-Based Global Quantum Communication, Physical Review Letters, vol.94, issue.15, pp.150501-150502, 2005.
DOI : 10.1103/PhysRevLett.94.150501

I. Marcikic, A. Lamas-linares, and C. Kurtsiefer, Free-space quantum key distribution with entangled photons. arXiv :quant-ph/0606072, 2006.

X. Mo, B. Zhu, and Z. Han, You-Zhen Gui et Guang-Can Guo : Faraday-Michelson system for quantum cryptography, Opt. Lett, vol.19, issue.30, pp.2632-2634, 2005.

D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, Quantum key distribution over 67 km with a plug&play system, New Journal of Physics, vol.4, pp.41-42, 2002.
DOI : 10.1088/1367-2630/4/1/341

L. Olivier, J. Guerreau, A. Merolla, F. Soujaeff, J. Patois et al., Malassenet : Long-Distance QKD Transmission using Single Sideband Detection Scheme with WDM Synchronization

Z. L. Yuan and A. J. Shields, Continuous operation of a one-way quantum key distribution system over installed telecom fibre, Optics Express, vol.13, issue.2, pp.660-665, 2005.
DOI : 10.1364/OPEX.13.000660

D. Gottesman, H. Lo, and N. Lütkenhaus, Preskill : Security of quantum key distribution with imperfect devices, Quant. Inf. Comp, vol.4, issue.5, pp.325-360, 2004.

G. Brassard, N. Lütkenhaus, T. Mor, and C. Barry, Limitations on Practical Quantum Cryptography, Physical Review Letters, vol.85, issue.6, pp.1330-1333, 2000.
DOI : 10.1103/PhysRevLett.85.1330

N. Lütkenhaus, Security against individual attacks for realistic quantum key distribution, Physical Review A, vol.61, issue.5, pp.61052304-61052305, 2000.
DOI : 10.1103/PhysRevA.61.052304

D. Mayers, Unconditional security in quantum cryptography, Journal of the ACM, vol.48, issue.3, pp.351-406, 2001.
DOI : 10.1145/382780.382781

H. Inamori, N. Lütkenhaus, and D. Mayers, Unconditional security of practical quantum key distribution, The European Physical Journal D, vol.10, issue.3, pp.599-627, 2006.
DOI : 10.1140/epjd/e2007-00010-4

A. Acín, N. Gisin, and V. Scarani, Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks, Physical Review A, vol.69, issue.1, p.12309, 2004.
DOI : 10.1103/PhysRevA.69.012309

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Physical Review Letters, vol.92, issue.5, pp.57901-57902, 2004.
DOI : 10.1103/PhysRevLett.92.057901

H. Lo, X. Ma, and K. Chen, Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, pp.230504-230505, 2005.
DOI : 10.1103/PhysRevLett.94.230504

T. C. Ralph, Continuous variable quantum cryptography, Physical Review A, vol.61, issue.1, pp.10303-10304, 1999.
DOI : 10.1103/PhysRevA.61.010303

URL : http://arxiv.org/abs/quant-ph/9907073

T. C. Ralph, Security of continuous-variable quantum cryptography, Physical Review A, vol.62, issue.6, pp.62306-62307, 2000.
DOI : 10.1103/PhysRevA.62.062306

M. D. Reid, Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations, Physical Review A, vol.62, issue.6, pp.62308-62309, 2000.
DOI : 10.1103/PhysRevA.62.062308

K. Bencheikh, T. Symul, A. Jankovic, and J. A. Levenson, Quantum key distribution with continuous variables, Journal of Modern Optics, vol.48, issue.13, pp.1903-1920, 2001.
DOI : 10.1364/OL.16.001234

M. Hillery, Quantum cryptography with squeezed states, Physical Review A, vol.61, issue.2, pp.61022309-61022310, 2000.
DOI : 10.1103/PhysRevA.61.022309

D. Gottesman and J. Preskill, Secure quantum key distribution using squeezed states, Physical Review A, vol.63, issue.2, pp.22309-22310, 2001.
DOI : 10.1103/PhysRevA.63.022309

N. J. Cerf, M. Lévy, and G. Van-assche, Quantum distribution of Gaussian keys using squeezed states, Physical Review A, vol.63, issue.5, pp.52311-52312, 2001.
DOI : 10.1103/PhysRevA.63.052311

F. Grosshans and P. Grangier, Continuous Variable Quantum Cryptography Using Coherent States, Physical Review Letters, vol.88, issue.5, pp.57902-57903, 2002.
DOI : 10.1103/PhysRevLett.88.057902

URL : https://hal.archives-ouvertes.fr/hal-00509124

F. Grosshans, N. J. Cerf, J. Wenger, R. Rualle-brouri, and P. Grangier, Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables, Quant. Inf. Comp, vol.3, pp.535-552, 2003.
URL : https://hal.archives-ouvertes.fr/hal-00509120

J. Wenger, Dispositifs impulsionnels pour la communication quantiquè a variables continues, Thèse de doctorat, 2004.

F. Grosshans and J. Nicolas, Continuous-Variable Quantum Cryptography is Secure against Non-Gaussian Attacks, Physical Review Letters, vol.92, issue.4, pp.47905-47906, 2004.
DOI : 10.1103/PhysRevLett.92.047905

URL : http://arxiv.org/abs/quant-ph/0311006

M. Navascués and A. Ac´, SecurityBounds for Continuous Variables Quantum Key Distribution, Physical Review Letters, vol.94, issue.2, pp.20505-20506, 2005.
DOI : 10.1103/PhysRevLett.94.020505

R. Garcia-patron and J. Nicolas, Cerf : Unconditional optimality of gaussian attacks against continuous-variable qkd, Phys. Rev. Lett, vol.97, pp.19050-19051, 2006.

M. Navascues, F. Grosshans, and A. Acin, Optimality of Gaussian Attacks in Continuous-Variable Quantum Cryptography, Physical Review Letters, vol.97, issue.19, pp.190502-190503, 2006.
DOI : 10.1103/PhysRevLett.97.190502

URL : https://hal.archives-ouvertes.fr/hal-00105621

C. Weedbrook, A. M. Lance, P. Warwick, T. Bowen, T. C. Symul et al., Quantum Cryptography Without Switching, Physical Review Letters, vol.93, issue.17, pp.170504-170505, 2004.
DOI : 10.1103/PhysRevLett.93.170504

URL : http://arxiv.org/abs/quant-ph/0405105

. Ch, T. C. Silberhorn, N. Ralph, and . Lutkenhaus, Leuchs : Continuous Variable Quantum Cryptography : Beating the 3 dB Loss Limit, Phys. Rev. Lett, vol.89, issue.16, pp.167901-167902, 2002.

S. Lorenz, N. Korolkova, and G. Leuch, Continuous-variable quantum key distribution using polarization encoding and post selection, Applied Physics B, vol.67, issue.3, pp.273-277, 2004.
DOI : 10.1007/s003400050574

A. M. Lance, T. Symul, V. Sharma, C. Weedbrook, and C. Timothy, No-Switching Quantum Key Distribution Using Broadband Modulated Coherent Light, Physical Review Letters, vol.95, issue.18, pp.180503-180504, 2005.
DOI : 10.1103/PhysRevLett.95.180503

J. Lodewyck, T. Debuisschert, R. Tualle-brouri, and P. Grangier, Controlling excess noise in fiber-optics continuous-variable quantum key distribution, Physical Review A, vol.72, issue.5, pp.50303-50304, 2005.
DOI : 10.1103/PhysRevA.72.050303

M. Legré, H. Zbinden, and N. Gisin, Implementation of continuous variable quantum cryptographyin optical fibres using a go-&-return configuration, Quant. Inf. Comp, vol.6, issue.4&5, p.326, 2006.

M. Keller, B. Lange, K. Hayasaka, W. Lange, and H. Walther, Continuous generation of single photons with controlled waveform in an ion-trap cavity system. Letters to Nature, pp.1075-1078, 2005.

S. Tanzilli, W. Tittel, H. De-riedmatten, H. Zbinden, P. Baldi et al., Gisin : PPLN waveguide for quantum communication, Euro. Phys. D, vol.18, pp.155-160, 2002.

A. Othonos, Fiber Bragg gratings, Review of Scientific Instruments, vol.68, issue.12, pp.4309-4341, 1997.
DOI : 10.1063/1.1148392

M. Ley and R. Loudon, Quantum Theory of High-resolution Length Measurement with a Fabry-Perot Interferometer, Journal of Modern Optics, vol.31, issue.2, pp.227-255, 1987.
DOI : 10.1364/JOSAB.3.001315

A. Yariv and P. Yeh, Optical Waves in Crystals, 2003.

P. C. Sun, Y. Mazurenko, and Y. , Long-distance frequency-division interferometer for communication and quantum cryptography, Optics Letters, vol.20, issue.9, pp.1062-1064, 1995.
DOI : 10.1364/OL.20.001062

A. Stefanov, H. Zbinden, N. Gisin, and A. Suarez, Quantum entanglement with acousto-optic modulators: Two-photon beats and Bell experiments with moving beam splitters, Physical Review A, vol.67, issue.4, pp.42115-42116, 2003.
DOI : 10.1103/PhysRevA.67.042115

J. Merolla, Y. Mazurenko, J. Goedgebuer, L. Durrafourg, H. Porte et al., Quantum cryptographic device using single-photon phase modulation, Physical Review A, vol.60, issue.3, pp.1899-1905, 1999.
DOI : 10.1103/PhysRevA.60.1899

J. Merolla, Y. Mazurenko, J. Goegebuer, and W. T. Rhodes, Single-Photon Interference in Sidebands of Phase-Modulated Light for Quantum Cryptography, Physical Review Letters, vol.82, issue.8, pp.1656-1659, 1999.
DOI : 10.1103/PhysRevLett.82.1656

J. Merolla, Y. Mazurenko, J. Goegebuer, and W. T. Rhodes, Phase-modulation transmission system for quantum cryptography, Optics Letters, vol.24, issue.2, pp.104-106, 1999.
DOI : 10.1364/OL.24.000104

P. Govind, Agrawal : Fiber-Optic Communication Systems, 2002.

A. Zavatta, M. Bellini, P. L. Ramazza, F. Marin-et-fortunato, and T. Arecchi, Time-domain analysis of quantum states of light: noise characterization and homodyne tomography, Journal of the Optical Society of America B, vol.19, issue.5, pp.1189-1194, 2002.
DOI : 10.1364/JOSAB.19.001189

K. J. Blow, R. Loudon, and J. D. Simon, Continuum fields in quantum optics, Physical Review A, vol.42, issue.7, pp.4102-4114, 1990.
DOI : 10.1103/PhysRevA.42.4102

F. Grosshans and P. Grangier, Effective quantum efficiency in the pulsed homodyne detection of a n-photon state, The European Physical Journal D, vol.14, issue.1, pp.119-125, 2001.
DOI : 10.1007/s100530170243

URL : https://hal.archives-ouvertes.fr/hal-00554233

P. Horace, . Yuen, W. S. Vincent, and . Chan, Noise in homodyne and heterodyne detection, Opt. Lett, vol.8, issue.3, pp.177-179, 1983.

J. G. Graeme, Photodiode Amplifiers : OP AMP Solutions, 1995.

K. Nguyen, G. Van-assche, and J. Nicolas, Cerf : Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution, Proc. International Symposium on Information Theory and its Applications, 2004.

G. Caire, G. Taricco, and E. Biglieri, Bit-interleaved coded modulation, IEEE Transactions on Information Theory, vol.44, issue.3, pp.927-946, 1998.
DOI : 10.1109/18.669123

. Stephan and . Brink, Iterative demapping and decoding for multilevel modulation, Proc. IEEE Globecom Conference, pp.579-584, 1998.

U. Wachsmann, R. F. Fischer, and J. B. Huber, Multilevel codes: theoretical concepts and practical design rules, IEEE Transactions on Information Theory, vol.45, issue.5, pp.1361-1391, 1999.
DOI : 10.1109/18.771140

T. Wörz and J. Hagenauer, Iterative decoding for multilevel codes using reliability information, [Conference Record] GLOBECOM '92, Communications for Global Users: IEEE, 1992.
DOI : 10.1109/GLOCOM.1992.276690

R. G. Gallager, Low-density parity-check codes, Thèse de doctorat, Massachusetts Institute of Technology, 1963.
DOI : 10.1109/TIT.1962.1057683

D. Angelos, Z. Liveris, . Xiong, and N. Costas, Georghiades : Compression of Binary Sources With Side Information at the Decoder Using LDPC Codes, IEEE Comm. Lett, vol.6, issue.10, pp.440-442, 2002.

F. R. Kschischang, B. J. Frey, and H. , Factor graphs and the sum-product algorithm, IEEE Transactions on Information Theory, vol.47, issue.2, pp.498-519, 2001.
DOI : 10.1109/18.910572

T. J. Richardson, M. A. Shokrollahi, and L. Rdiger, Urbanke : Design of Capacity-Approaching Irregular Low-Density Parity-Check Codes, IEEE Trans

A. De-baynast and P. Radosavljevic, Joe Cavallaro et Ashutosh Sabharwal : Turbo-schedule for ldpc decoding, Proc. 43rd Allerton Conference, 2005.

S. Chung, J. G. David, T. J. Forney, R. Richardson, and . Urbanke, On the design of low-density parity-check codes within 0.0045 dB of the Shannon limit, IEEE Communications Letters, vol.5, issue.2, pp.58-60, 2001.
DOI : 10.1109/4234.905935

. Stephan and . Brink, Convergence Behavior of Iteratively Decoded Parallel Concatenated Codes, IEEE Trans. Comm, vol.49, issue.10, pp.1727-1737, 2001.

J. Chen, A. Dholakia, E. Eleftheriou, M. P. Fossorier, and X. Hu, Reduced-Complexity Decoding of LDPC Codes, IEEE Transactions on Communications, vol.53, issue.8, pp.1288-1299, 2005.
DOI : 10.1109/TCOMM.2005.852852