{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:05:14Z","timestamp":1743102314168,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_11","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"156-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Physical Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7545-4846","authenticated-orcid":false,"given":"Mariana","family":"Costiuc","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9541-5705","authenticated-orcid":false,"given":"Diana","family":"Maimu\u0163","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3953-2744","authenticated-orcid":false,"given":"George","family":"Te\u015feleanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"11_CR1","unstructured":"Falstad Electronic Circuit. \nhttps:\/\/www.falstad.com"},{"key":"11_CR2","unstructured":"The Diffie-Hellman Key Exchange Using Paint. \nhttps:\/\/www.youtube.com\/watch?v=3QnD2c4Xovk"},{"issue":"1\u20133","key":"11_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0304-3975(03)00210-X","volume":"306","author":"J Balogh","year":"2003","unstructured":"Balogh, J., Csirik, J.A., Ishai, Y., Kushilevitz, E.: Private computation using a PEZ dispenser. Theor. Comput. Sci. 306(1\u20133), 69\u201384 (2003)","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"11_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0360-1315(02)00102-1","volume":"40","author":"T Bell","year":"2003","unstructured":"Bell, T., Thimbleby, H., Fellows, M., Witten, I., Koblitz, N., Powell, M.: Explaining cryptographic systems. Comput. Educ. 40(3), 199\u2013215 (2003)","journal-title":"Comput. Educ."},{"issue":"5","key":"11_CR5","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1080\/01611194.2016.1238422","volume":"41","author":"X Bultel","year":"2017","unstructured":"Bultel, X., Dreier, J., Lafourcade, P., More, M.: How to explain modern security concepts to your children. Cryptologia 41(5), 422\u2013447 (2017)","journal-title":"Cryptologia"},{"key":"11_CR6","unstructured":"Courtois, N.T.: Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors. IACR Cryptology ePrint Archive (2013). \nhttp:\/\/eprint.iacr.org\/2013\/302"},{"key":"11_CR7","unstructured":"Crowley, P.: Mirdek: a card cipher inspired by \u201cSolitaire\u201d. \nhttp:\/\/www.ciphergoth.org\/crypto\/mirdek\/"},{"issue":"5","key":"11_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/229459.229469","volume":"39","author":"R Fagin","year":"1996","unstructured":"Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun. ACM 39(5), 77\u201385 (1996)","journal-title":"Commun. ACM"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1142\/S012905411750023X","volume":"28","author":"D Grigoriev","year":"2017","unstructured":"Grigoriev, D., Kish, L.B., Shpilrain, V.: Yao\u2019s Millionaires\u2019 problem and public-key encryption without computational assumptions. Int. J. Found. Comput. Sci. 28(4), 379\u2013390 (2017)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-39074-6_12","volume-title":"Unconventional Computation and Natural Computation","author":"D Grigoriev","year":"2013","unstructured":"Grigoriev, D., Shpilrain, V.: Secure information transmission based on physical principles. In: Mauri, G., Dennunzio, A., Manzoni, L., Porreca, A.E. (eds.) UCNC 2013. LNCS, vol. 7956, pp. 113\u2013124. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39074-6_12"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1142\/S0129054114400036","volume":"25","author":"D Grigoriev","year":"2014","unstructured":"Grigoriev, D., Shpilrain, V.: Yao\u2019s millionaires\u2019 problem and decoy-based public key encryption by classical physics. Int. J. Found. Comput. Sci. 25(4), 409\u2013418 (2014)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"11_CR12","volume-title":"Fundamentals of Physics","author":"D Halliday","year":"2010","unstructured":"Halliday, D., Resnick, R., Walker, J.: Fundamentals of Physics. Wiley, Hoboken (2010)"},{"key":"11_CR13","unstructured":"Khovanova, T.: One-Way Functions. \nhttps:\/\/blog.tanyakhovanova.com\/2010\/11\/one-way-functions\/"},{"key":"11_CR14","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11761679_7","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"T Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Polling with physical envelopes: a rigorous analysis of a human-centric protocol. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 88\u2013108. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11761679_7"},{"issue":"10","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1016\/j.tcs.2009.10.023","volume":"411","author":"T Moran","year":"2010","unstructured":"Moran, T., Naor, M.: Basing cryptographic protocols on tamper-evident seals. Theor. Comput. Sci. 411(10), 1283\u20131310 (2010)","journal-title":"Theor. Comput. Sci."},{"key":"11_CR17","unstructured":"Naor, M., Naor, Y., Reingold, O.: Applied kid cryptography or how to convince your children you are not cheating. \nhttp:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/waldo.pdf"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-030-12942-2_38","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"K Nishigami","year":"2019","unstructured":"Nishigami, K., Iwamura, K.: Geometric pairwise key-sharing scheme. In: Lanet, J.-L., Toma, C. (eds.) SECITC 2018. LNCS, vol. 11359, pp. 518\u2013528. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-12942-2_38"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/0-387-34805-0_60","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"J-J Quisquater","year":"1990","unstructured":"Quisquater, J.-J., et al.: How to explain zero-knowledge protocols to your children. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 628\u2013631. Springer, New York (1990). \nhttps:\/\/doi.org\/10.1007\/0-387-34805-0_60"},{"key":"11_CR20","unstructured":"Schneier, B.: The Solitaire Encryption Algorithm. \nhttps:\/\/www.schneier.com\/academic\/solitaire\/"},{"issue":"2","key":"11_CR21","first-page":"149","volume":"6","author":"V Shpilrain","year":"2014","unstructured":"Shpilrain, V.: Groups Complexity Cryptology. Decoy-Based Inf. Secur. 6(2), 149\u2013155 (2014)","journal-title":"Decoy-Based Inf. Secur."},{"key":"11_CR22","volume-title":"The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography","author":"S Singh","year":"2000","unstructured":"Singh, S.: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, New York City (2000)"},{"key":"11_CR23","unstructured":"Stephenson, N.: Cryptonomicon. Arrow (2000)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: SFCS 1982, pp. 160\u2013164. IEEE Computer Society (1982)","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:16:17Z","timestamp":1582848977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}