{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:40:46Z","timestamp":1775857246409,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138683","type":"print"},{"value":"9783642138690","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_31","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T07:24:20Z","timestamp":1277796260000},"page":"430-440","source":"Crossref","is-referenced-by-count":46,"title":["Oblivious Transfer Based on Physical Unclonable Functions"],"prefix":"10.1007","author":[{"given":"Ulrich","family":"R\u00fchrmair","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science\u00a0297, 2026\u20132030 (2002)","journal-title":"Science"},{"key":"31_CR2","volume-title":"Security, Privacy and Trust in Modern Data Management","author":"P. Tuyls","year":"2007","unstructured":"Tuyls, P., Skoric, B.: Strong Authentication with Physical Unclonable Functions. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management, Springer, Heidelberg (2007)"},{"key":"31_CR3","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard University (1981)"},{"key":"31_CR4","first-page":"205","volume-title":"Proc. CRYPTO 1982","author":"S. Even","year":"1982","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Rivest, R.L., Sherman, A., Chaum, S. (eds.) Proc. CRYPTO 1982, pp. 205\u2013210. Plenum Press, New York (1982)"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/3-540-48184-2_30","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"C. Cr\u00e9peau","year":"1988","unstructured":"Cr\u00e9peau, C.: Equivalence between two flavors of oblivious transfer. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 350\u2013354. Springer, Heidelberg (1988)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets. In: Proc. of the 27th IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Widgerson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Proc. of the 19th Annual Symposium on the Theory of Computing (STOC), pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/3-540-48184-2_6","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"O. Goldreich","year":"1988","unstructured":"Goldreich, O., Vainish, R.: How to solve any protocol problem \u2013 an efficiency improvement. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 73\u201386. Springer, Heidelberg (1988)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings, 20th Annual ACM Symposium on the Theory of Computation, STOC (1988)","DOI":"10.1145\/62212.62215"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-44750-4_9","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"C. Crepeau","year":"1995","unstructured":"Crepeau, C., van de Graaf, J., Tapp, A.: Committed oblivious transfer and private multi-party computations. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 110\u2013123. Springer, Heidelberg (1995)"},{"issue":"1","key":"31_CR11","doi-asserted-by":"crossref","first-page":"012331","DOI":"10.1103\/PhysRevA.73.012331","volume":"73","author":"G.P. He","year":"2006","unstructured":"He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Physical Review A\u00a073(1), Part A, 012331 (2006)","journal-title":"Physical Review A"},{"issue":"22","key":"31_CR12","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1103\/PhysRevLett.100.220502","volume":"100","author":"S. Wehner","year":"2008","unstructured":"Wehner, S., Schaffner, C., Terhal, B.M.: Cryptography from noisy storage. Phys. Rev. Lett.\u00a0100(22), 220\u2013502 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"31_CR13","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s001459900037","volume":"11","author":"M. Naor","year":"1998","unstructured":"Naor, M., Ostrovsky, R., Venkatesan, R., Yung, M.: Perfect zero-knowledge arguments for NP using any one-way function. Journal of Cryptology\u00a011(2), 87\u2013108 (1998)","journal-title":"Journal of Cryptology"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Cachin, C., Crepeau, C., Marcil, J.: Oblivious transfer with a memory-bounded receiver. In: Proceeding of the 39th Annual Symposium on Foundations of Computer Science (1998)","DOI":"10.1109\/SFCS.1998.743500"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Ding, Y.Z., Harnik, D., Rosen, A., Shaltiel, R.: Constant-Round Oblivious Transfer in the Bounded Storage Model. Journal of Cryptology (2007)","DOI":"10.1007\/s00145-006-0438-1"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/3-540-69053-0_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"C. Crepeau","year":"1997","unstructured":"Crepeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 306\u2013317. Springer, Heidelberg (1997)"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-00457-5_20","volume-title":"Theory of Cryptography","author":"J. Wullschleger","year":"2009","unstructured":"Wullschleger, J.: Oblivious Transfer from Weak Noisy Channels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 332\u2013349. Springer, Heidelberg (2009)"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"31_CR19","volume-title":"Physical Random Functions, MSc Thesis","author":"B. Gassend","year":"2003","unstructured":"Gassend, B.: Physical Random Functions, MSc Thesis. MIT, Cambridge (2003)"},{"key":"31_CR20","volume-title":"Extracting Secret Keys from Integrated Circuits, MSc Thesis","author":"D. Lim","year":"2004","unstructured":"Lim, D.: Extracting Secret Keys from Integrated Circuits, MSc Thesis. MIT, Cambridge (2004)"},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"1611","author":"B. Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Dijk, M.v., Devadas, S.: Identification and authentication of integrated circuits. Concurrency and Computation: Practice & Experience\u00a01611, 1077\u20131098 (2004)","journal-title":"Concurrency and Computation: Practice & Experience"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Lee, J.-W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits with identification and authentication applications. In: Proceedings of the IEEE VLSI Circuits Symposium (June 2004)","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight Secure PUFs. In: IC-CAD 2008 (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Csaba, G., Ju, X., Ma, Z., Chen, Q., Porod, W., Schmidhuber, J., Schlichtmann, U., Lugli, P., R\u00fchrmair, U.: Application of Mismatched Cellular Nonlinear Networks for Physical Cryptography. In: IEEE CNNA (2010)","DOI":"10.1109\/CNNA.2010.5430303"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Testing Techniques for Hardware Security. In: IEEE International Test Conference (2008)","DOI":"10.1109\/TEST.2008.4700636"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., Soelter, J., Dror, G., Devadas, S., Schmidhuber, J.: Modeling Attacks on Physical Unclonable Functions (submitted 2010)","DOI":"10.1145\/1866307.1866335"},{"key":"31_CR27","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Jaeger, C., Hilgers, C., Algasinger, M., Csaba, G., Stutzmann, M.: Security Applications of Diodes with Random Current-Voltage Characteristics. In: Financial Cryptography and Data Security (2010)","DOI":"10.1007\/978-3-642-14577-3_26"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Jaeger, C., Bator, M., Stutzmann, M., Lugli, P., Csaba, G.: Applications of High-Capacity Crossbar Memories in Cryptography. IEEE Transactions on Nanotechnology (to appear 2010)","DOI":"10.1109\/TNANO.2010.2049367"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Jaeger, C., Algasinger, M., R\u00fchrmair, U., Csaba, G., Stutzmann, M.: Random pn-junctions for physical cryptography. Applied Physics Letters (to appear 2010)","DOI":"10.1063\/1.3396186"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Devadas, S.: Physical Unclonable Functions for Device Authentication and Secret Key Generation. In: DAC 2007, pp. 9\u201314 (2007)","DOI":"10.1109\/DAC.2007.375043"},{"key":"31_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11761679_14","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"S. Wolf","year":"2006","unstructured":"Wolf, S., Wullschleger, J.: Oblivious Transfer Is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 222\u2013232. Springer, Heidelberg (2006)"},{"issue":"1","key":"31_CR32","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TIT.1973.1054929","volume":"19","author":"T.M. Cover","year":"1973","unstructured":"Cover, T.M.: Enumerative Source Encoding. IEEE Transactions on Information Theory\u00a019(1), 73\u201377 (1973)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:44:46Z","timestamp":1606167886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}