{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:23:41Z","timestamp":1774023821735,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642126772","type":"print"},{"value":"9783642126789","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12678-9_22","type":"book-chapter","created":{"date-parts":[[2010,4,29]],"date-time":"2010-04-29T11:28:35Z","timestamp":1272540515000},"page":"369-386","source":"Crossref","is-referenced-by-count":15,"title":["Quantum Readout of Physical Unclonable Functions"],"prefix":"10.1007","author":[{"given":"Boris","family":"\u0160kori\u0107","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Full version, available at Cryptology ePrint Archive, Report 2009\/369 (2009)"},{"key":"22_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: IEEE Int. Conf. on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C.H. Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett.\u00a070, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1038\/436475a","volume":"436","author":"J.D.R. Buchanan","year":"2005","unstructured":"Buchanan, J.D.R., Cowburn, R.P., Jausovec, A., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Forgery: \u2018fingerprinting\u2019 documents and packaging. Nature, Brief Communications\u00a0436, 475 (2005)","journal-title":"Nature, Brief Communications"},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. of Computer and System Sciences\u00a018(2), 143\u2013154 (1979)","journal-title":"J. of Computer and System Sciences"},{"key":"22_CR6","first-page":"146","volume-title":"SECURWARE 2008","author":"C.N. Chong","year":"2008","unstructured":"Chong, C.N., Jiang, D., Zhang, J., Guo, L.: Anti-counterfeiting with a random pattern. In: SECURWARE 2008, pp. 146\u2013153. IEEE, Los Alamitos (2008)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-540-78967-3_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"R. Cramer","year":"2008","unstructured":"Cramer, R., Dodis, Y., Fehr, S., Padr\u00f3, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 471\u2013488. Springer, Heidelberg (2008)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"DeJean, G., Kirovski, D.: Radio frequency certificates of authenticity. In: IEEE Antenna and Propagation Symposium \u2013 URSI (2006)","DOI":"10.1109\/APS.2006.1710711"},{"key":"22_CR9","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0375-9601(82)90084-6","volume":"92","author":"D. Dieks","year":"1982","unstructured":"Dieks, D.: Phys. Lett. A, 92, 271 (1982)","journal-title":"Phys. Lett. A"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/35106500","volume":"414","author":"L.M. Duan","year":"2001","unstructured":"Duan, L.M., Lukin, M., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature\u00a0414, 413\u2013418 (2001)","journal-title":"Nature"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett.\u00a067, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical unknown functions. In: ACM Conf. on Computer and Communications Security \u2013 CCS 2002, November 2002, pp. 148\u2013160 (2002)","DOI":"10.1145\/586110.586132"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Gottesman, D., Preskill, J.: Secure quantum key exchange using squeezed states, arXiv:quant-ph\/0008046v2 (2000)","DOI":"10.1103\/PhysRevA.63.022309"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"57901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W.-Y. Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett.\u00a091, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"37902","DOI":"10.1103\/PhysRevLett.89.037902","volume":"89","author":"K. Inoue","year":"2002","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett.\u00a089, 037902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1145\/988772.988797","volume-title":"ACM Conference on Electronic Commerce","author":"D. Kirovski","year":"2004","unstructured":"Kirovski, D.: Toward an automated verification of certificates of authenticity. In: ACM Conference on Electronic Commerce, pp. 160\u2013169. ACM, New York (2004)"},{"key":"22_CR18","first-page":"67","volume-title":"HOST 2008","author":"S.S. Kumar","year":"2008","unstructured":"Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The Butterfly PUF: Protecting IP on every FPGA. In: HOST 2008, pp. 67\u201370. IEEE, Los Alamitos (2008)"},{"key":"22_CR19","unstructured":"Kursawe, K., Sadeghi, A.-R., Schellekens, D., \u0160kori\u0107, B., Tuyls, P.: Reconfigurable physical unclonable functions. In: HOST 2009 (2009)"},{"issue":"5696","key":"22_CR20","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1126\/science.1103346","volume":"306","author":"D.N. Matsukevich","year":"2004","unstructured":"Matsukevich, D.N., Kuzmich, A.: Quantum state transfer between matter and light. Science\u00a0306(5696), 663\u2013666 (2004)","journal-title":"Science"},{"key":"22_CR21","unstructured":"Pappu, R.: Physical One-Way Functions. PhD thesis, MIT (2001)"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"22_CR23","unstructured":"Renner, R.: Security of Quantum Key Distribution. PhD thesis, ETH Zurich (2005)"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/S0375-9601(01)00129-3","volume":"281","author":"B.S. Shi","year":"2001","unstructured":"Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A\u00a0281, 83\u201387 (2001)","journal-title":"Phys. Lett. A"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D.R. Stinson","year":"1994","unstructured":"Stinson, D.R.: Universal hashing and authentication codes. Designs, Codes, and Cryptography\u00a04, 369\u2013380 (1994)","journal-title":"Designs, Codes, and Cryptography"},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/11894063_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"P. Tuyls","year":"2006","unstructured":"Tuyls, P., Schrijen, G.J., \u0160kori\u0107, B., van Geloven, J., Verhaegh, R., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 369\u2013383. Springer, Heidelberg (2006)"},{"key":"22_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-984-2","volume-title":"Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting","author":"P. Tuyls","year":"2007","unstructured":"Tuyls, P., \u0160kori\u0107, B., Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, London (2007)"},{"key":"22_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/11507840_15","volume-title":"Financial Cryptography and Data Security","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., \u0160kori\u0107, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Information-theoretic security analysis of physical uncloneable functions. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 141\u2013155. Springer, Heidelberg (2005)"},{"issue":"5","key":"22_CR29","doi-asserted-by":"publisher","first-page":"55304","DOI":"10.1088\/1464-4258\/10\/5\/055304","volume":"10","author":"B. \u0160kori\u0107","year":"2008","unstructured":"\u0160kori\u0107, B.: On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle. Journal of Optics A: Pure and Applied Optics\u00a010(5), 055304\u2013055316 (2008)","journal-title":"Journal of Optics A: Pure and Applied Optics"},{"key":"22_CR30","unstructured":"\u0160kori\u0107, B., Bel, T., Blom, A.H.M., de Jong, B.R., Kretschman, H., Nellissen, A.J.M.: Randomized resonators as uniquely identifiable anti-counterfeiting tags. In: Secure Component and System Identification Workshop, Berlin (March 2008)"},{"key":"22_CR31","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W.K. Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature\u00a0299, 802\u2013803 (1982)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12678-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:13Z","timestamp":1606186573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12678-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642126772","9783642126789"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12678-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}