{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T08:23:48Z","timestamp":1771835028710,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030380847","type":"print"},{"value":"9783030380854","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38085-4_35","type":"book-chapter","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T20:02:20Z","timestamp":1581796940000},"page":"412-424","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Physical Layer Security in Optical Networks"],"prefix":"10.1007","author":[{"given":"Dimitris","family":"Syvridis","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Pikasis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8328-2135","authenticated-orcid":false,"given":"Charidimos","family":"Chaintoutis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,16]]},"reference":[{"issue":"11","key":"35_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MCOM.2006.248169","volume":"44","author":"R Rejeb","year":"2006","unstructured":"Rejeb, R., Leeson, M.S., Green, R.J.: Fault and attack management in all-optical networks. IEEE Commun. Mag. 44(11), 79\u201386 (2006)","journal-title":"IEEE Commun. Mag."},{"key":"35_CR2","first-page":"83","volume":"1","author":"Z Wang","year":"2012","unstructured":"Wang, Z., Fok, M.P., Prucnal, P.R.: Physical encoding in optical layer security. J. Cyber. Secur. Mob. 1, 83\u2013100 (2012)","journal-title":"J. Cyber. Secur. Mob."},{"issue":"1","key":"35_CR3","first-page":"1","volume":"2","author":"B Schneier","year":"2000","unstructured":"Schneier, B., et al.: The twofish team\u2019s final comments on AES selection. AES Round 2(1), 1\u201313 (2000)","journal-title":"AES Round"},{"issue":"19","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1109\/LPT.2010.2061223","volume":"22","author":"Z Wang","year":"2010","unstructured":"Wang, Z., Xu, L., Chang, J., Wang, T., Prucnal, P.R.: Secure optical transmission in a point-to-point link with encrypted CDMA codes. IEEE Photonics Technol. Lett. 22(19), 1410\u20131412 (2010)","journal-title":"IEEE Photonics Technol. Lett."},{"issue":"17","key":"35_CR5","first-page":"343","volume":"438","author":"A Argiris","year":"2006","unstructured":"Argiris, A., Syvridis, D., Larger, L., Lodi, V.A., Colet, P., Fischer, I., et al.: Chaos-based communications at high bit rates using commercial fibre-optic links. Nature 438(17), 343\u2013346 (2006)","journal-title":"Nature"},{"issue":"9","key":"35_CR6","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1109\/JLT.2012.2188377","volume":"30","author":"A Argyris","year":"2012","unstructured":"Argyris, A., Pikasis, E., Deligiannidis, S., Syvridis, D.: Sub-Tb\/s physical random bit generators based on direct detection of amplified spontaneous emission signals. J. Lightwave Technol. 30(9), 1329\u20131334 (2012)","journal-title":"J. Lightwave Technol."},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"010503-1","DOI":"10.1103\/PhysRevLett.98.010503","volume":"98","author":"D Rosenberg","year":"2007","unstructured":"Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., et al.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503-1\u2013010503-4 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"241129-1","DOI":"10.1063\/1.2405870","volume":"89","author":"RH Hadfield","year":"2006","unstructured":"Hadfield, R.H., Habif, J.L., Schlafer, J., Schwall, R.E., Nam, S.W.: Quantum key distribution at 1550\u00a0nm with twin superconducting single-photon detectors. Appl. Phys. Lett. 89, 241129-1 (2006)","journal-title":"Appl. Phys. Lett."},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"140502-1","DOI":"10.1103\/PhysRevLett.97.140502","volume":"97","author":"J Scheuer","year":"2006","unstructured":"Scheuer, J., Yariv, A.: Giant fiber lasers: a new paradigm for secure key distribution. Phys. Rev. Lett. 97, 140502-1\u2013140502-4 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"35_CR10","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4(10), 686\u2013689 (2010). https:\/\/doi.org\/10.1038\/nphoton.2010.214","journal-title":"Nat. Photon."},{"key":"35_CR11","unstructured":"Yuen, H.P.: Universality and The Criterion \u2018d\u2019 in Quantum Key Generation arXiv:0907.4694v1 (quant-ph) (2009)"},{"issue":"6","key":"35_CR12","doi-asserted-by":"publisher","first-page":"062304","DOI":"10.1103\/PhysRevA.82.062304","volume":"82","author":"HP Yuen","year":"2010","unstructured":"Yuen, H.P.: Fundamental quantitative security in quantum key generation. Phys. Rev. A 82(6), 062304 (2010). https:\/\/doi.org\/10.1103\/PhysRevA.82.062304","journal-title":"Phys. Rev. A"},{"key":"35_CR13","unstructured":"The British governmental white paper, \u201cQuantum Key Distribution,\u201d National Cyber Security Centre, a part of GCHQ in Britain, 4th Oct (2016)"},{"issue":"9","key":"35_CR14","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1364\/OE.14.003738","volume":"14","author":"BB Wu","year":"2006","unstructured":"Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738\u20133751 (2006)","journal-title":"Opt. Express"},{"issue":"22","key":"35_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/JLT.2016.2615870","volume":"34","author":"A Argyris","year":"2016","unstructured":"Argyris, A., Pikasis, E., Syvridis, D.: Gb\/s one time pad data encryption with synchronised chaos based true random bit generation. J. Lightwave Technol. 34(22), 532\u20135331 (2016)","journal-title":"J. Lightwave Technol."},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., et al.: Physical one-way functions. Science 297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., Van Dijk, M., et al.: Silicon physical random functions. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM (2002)","DOI":"10.1145\/586110.586132"},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-1-4419-8080-9_4","volume-title":"Introduction to Hardware Security and Trust","author":"U Ruhrmair","year":"2012","unstructured":"Ruhrmair, U., Devadas, S., Koushanfar, F.: Security based on physical unclonability and disorder. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust, pp. 65\u2013102. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-8080-9_4"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 2007 44th ACM\/IEEE Design Automation Conference DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"35_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14452-3","volume-title":"Towards Hardware-Intrinsic Security: Foundations And Practice","author":"P Tuyls","year":"2010","unstructured":"Tuyls, P.: Towards Hardware-Intrinsic Security: Foundations And Practice. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Kursawe, K., Sadeghi, A.-R., Schellekens, D., et al.: Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage (2009)","DOI":"10.1109\/HST.2009.5225058"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Qiu, P., Lyu, Y., Zhai, D., et al.: Physical unclonable functions-based linear encryption against code reuse attacks. In: 2016 53rd ACM\/EDAC\/IEEE Design Automation Conference (DAC) (2016)","DOI":"10.1145\/2897937.2898061"},{"key":"35_CR23","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1049\/iet-sen.2018.5291","volume":"13","author":"C Chaintoutis","year":"2018","unstructured":"Chaintoutis, C., et al.: Optical PUFs as physical root of trust for blockchain-driven applications. IET Software 13, 182\u2013186 (2018)","journal-title":"IET Software"},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentications and secret key generation. In: Proceedings of 44th Annual Conference on Design Automation, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"35_CR25","doi-asserted-by":"publisher","unstructured":"Maiti, A., Schaumont, P.: Improving the quality of a physical unclonable function using configurable ring oscillators. In: Proceedings of the International Conference on Field Programmable Logic and Applications, pp. 703\u2013707. IEEE (2009). https:\/\/doi.org\/10.1109\/FPL.2009.5272361","DOI":"10.1109\/FPL.2009.5272361"},{"key":"35_CR26","doi-asserted-by":"publisher","unstructured":"Lee, J.W., et al.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of the IEEE Symposium on VLSI Circuits. Digest of Technical Papers, pp. 176\u2013179. IEEE (2004). https:\/\/doi.org\/10.1109\/VLSIC.2004.1346548","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"35_CR27","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TCAD.2015.2418288","volume":"34","author":"X Xu","year":"2015","unstructured":"Xu, X., Rahmati, A., Holcomb, D.E., Fu, K., Burleson, W.: Reliable physical unclonable functions using data retention voltage of SRAM cells. IEEE Trans. Comput. Des. Integr. Circuits Syst. 34, 903\u2013914 (2015)","journal-title":"IEEE Trans. Comput. Des. Integr. Circuits Syst."},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Nguyen, P.H., Sahoo, D.P., Chakraborty, R.S., Mukhopadhyay, D.: Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. In: Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 641\u2013646. IEEE (2015)","DOI":"10.7873\/DATE.2015.0699"},{"key":"35_CR29","doi-asserted-by":"crossref","unstructured":"Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65\u00a0nm Arbiter PUFs: accurate modeling poses strict bounds on usability. In: Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 37\u201342 (2012)","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"35_CR30","doi-asserted-by":"publisher","unstructured":"Tajik, S., Ganji, F., Seifert, J.P., Lohrke, H., Boit, C.: Laser fault attack on physically unclonable functions. In: Proceedings of 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp. 85\u201396. IEEE (2016). https:\/\/doi.org\/10.1109\/FDTC.2015.19","DOI":"10.1109\/FDTC.2015.19"},{"key":"35_CR31","unstructured":"Mahmoud, A., Ruhrmair, U., Majzoobi, M., Koushanfar, F.: Combined Modeling and Side Channel Attacks on Strong PUFs. IACR Cryptology ePrint Archive (2013)"},{"key":"35_CR32","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/ACCESS.2015.2503432","volume":"4","author":"Y Gao","year":"2016","unstructured":"Gao, Y., Ranasinghe, D.C., Al-Sarawi, S.F., Kavehei, O., Abbott, D.: Emerging Physica unclonable functions with nanotechnology. IEEE Access 4, 61\u201380 (2016)","journal-title":"IEEE Access"},{"key":"35_CR33","unstructured":"Ruhrmair, U., Hilgers, C., Urban, S., et al.: Optical pufs reloaded. Eprint Iacr.org (2013)"},{"key":"35_CR34","doi-asserted-by":"crossref","unstructured":"Akriotou, M., Mesaritakis, C., Grivas, E., et al.: Random number generation from a secure photonic physical unclonable hardware module. In: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London (2018)","DOI":"10.1007\/978-3-319-95189-8_3"},{"issue":"1","key":"35_CR35","doi-asserted-by":"publisher","first-page":"9653","DOI":"10.1038\/s41598-018-28008-6","volume":"8","author":"C Mesaritakis","year":"2018","unstructured":"Mesaritakis, C., Akriotou, M., Kapsalis, A., et al.: Physical unclonable function based on a multi-mode optical waveguide. Sci. Rep. 8(1), 9653 (2018)","journal-title":"Sci. Rep."},{"key":"35_CR36","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Maes, R., Sadeghi, A.-R., et al.: A formalization of the security features of physical functions. In: 2011 IEEE Symposium on Security and Privacy, pp. 397\u2013412 (2011)","DOI":"10.1109\/SP.2011.10"},{"key":"35_CR37","unstructured":"ITU-R SG05. Draft new Report ITU-R M. - Minimum requirements related to technical performance for IMT-2020 radio interface(s), February 2017"},{"issue":"3","key":"35_CR38","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOMSTD.001.1800036","volume":"3","author":"X Lin","year":"2019","unstructured":"Lin, X., et al.: 5G new radio: Unveiling the essentials of the next generation wireless access technology. IEEE Commun. Stand. Mag. 3(3), 30\u201337 (2019)","journal-title":"IEEE Commun. Stand. Mag."},{"key":"35_CR39","unstructured":"TS 38.211. NR; Physical channels and modulation. V15.1.0, April 2018. http:\/\/www.3gpp.org\/ftp\/\/Specs\/archive\/38_series\/38.211\/38211-f10.zip. Accessed 18 June 2018"}],"container-title":["Lecture Notes in Computer Science","Optical Network Design and Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38085-4_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T01:09:10Z","timestamp":1707959350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-38085-4_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030380847","9783030380854"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38085-4_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"16 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ONDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International IFIP Conference on Optical Network Design and Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ondm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ondm2019.com\/home\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}