{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:11:10Z","timestamp":1775067070251,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T00:00:00Z","timestamp":1447372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"WWTF (Wiener Wissenschafts-, Forschungs- und Technologiefonds)","award":["ICT10-067"],"award-info":[{"award-number":["ICT10-067"]}]},{"name":"FFG (\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft)","award":["Bridge-2364544"],"award-info":[{"award-number":["Bridge-2364544"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s11128-015-1160-4","type":"journal-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T13:54:52Z","timestamp":1447422892000},"page":"327-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Attacks on quantum key distribution protocols that employ non-ITS authentication"],"prefix":"10.1007","volume":"15","author":[{"given":"C.","family":"Pacher","sequence":"first","affiliation":[]},{"given":"A.","family":"Abidin","sequence":"additional","affiliation":[]},{"given":"T.","family":"Lor\u00fcnser","sequence":"additional","affiliation":[]},{"given":"M.","family":"Peev","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ursin","sequence":"additional","affiliation":[]},{"given":"A.","family":"Zeilinger","sequence":"additional","affiliation":[]},{"given":"J.-\u00c5.","family":"Larsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,13]]},"reference":[{"issue":"5","key":"1160_CR1","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1142\/S0219749909005754","volume":"7","author":"A Abidin","year":"2009","unstructured":"Abidin, A., Larsson, J.\u00c5.: Vulnerability of \u201cA novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography\u201d. Int. J. Quantum Inf. 7(5), 1047\u20131052 (2009)","journal-title":"Int. J. Quantum Inf."},{"key":"1160_CR2","unstructured":"Abidin, A., Larsson, J.\u00c5.: Security of authentication with a fixed key in quantum key distribution. arXiv:1109.5168v1 (2011)"},{"key":"1160_CR3","doi-asserted-by":"crossref","unstructured":"Abidin, A., Larsson, J.\u00c5.: New universal hash functions. In: Lucks, S., Armknecht, F. (eds.) WEWoRC 2011, LNCS, vol. 7242, pp. 99\u2013108. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34159-5_7"},{"key":"1160_CR4","unstructured":"Ben-Or, M., Mayers, D.: General security definition and composability for quantum & classical protocols. quant-ph\/0409062 (2004)"},{"key":"1160_CR5","unstructured":"Ben-Or, M., Mayers, D.: The universal composable security of quantum key distribution. In: Kilian, J. (eds.) Proceedings of TCC 2005. Springer, Cambridge, MA, Lecture Notes in Computer Science, vol. 3378, pp. 386\u2013406 (2005). quant-ph\/0409078"},{"key":"1160_CR6","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE New York, Bangalore, India, pp. 175\u2013179 (1984)"},{"issue":"1","key":"1160_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.A.: Experimental quantum cryptography. J. Cryptol. 5(1), 3\u201328 (1992)","journal-title":"J. Cryptol."},{"issue":"3","key":"1160_CR8","first-page":"181","volume":"5","author":"T Beth","year":"2005","unstructured":"Beth, T., M\u00fcller-Quade, J., Steinwandt, R.: Cryptanalysis of a practical quantum key distribution with polarization-entangled photons. Quantum Inf. Comput. 5(3), 181\u2013186 (2005)","journal-title":"Quantum Inf. Comput."},{"key":"1160_CR9","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1023\/A:1008226810363","volume":"11","author":"J Bierbrauer","year":"1997","unstructured":"Bierbrauer, J.: Universal hashing and geometric codes. Des. Codes Cryptogr. 11, 207\u2013221 (1997)","journal-title":"Des. Codes Cryptogr."},{"key":"1160_CR10","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On families of hash functions via geometric codes and concatenation. In: Stinson, D. (eds.) CRYPTO \u201993. Lecture Notes in Computer Science, vol. 773, pp. 331\u2013342. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48329-2_28"},{"issue":"2","key":"1160_CR11","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"JL Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143\u2013154 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"1160_CR12","first-page":"65","volume":"2","author":"B Boer den","year":"1993","unstructured":"den Boer, B.: A simple and key-economical unconditional authentication scheme. J. Comput. Secur. 2, 65\u201372 (1993)","journal-title":"J. Comput. Secur."},{"key":"1160_CR13","volume-title":"Cryptography Engineering","author":"N Ferguson","year":"2010","unstructured":"Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering. Wiley Publishing, Inc, New York (2010)"},{"key":"1160_CR14","unstructured":"Gilbert, G., Hamrick, M.: Practical quantum cryptography: a comprehensive analysis (part one). MITRE report MTR 00W0000052. quant-ph\/0009027v5 (2000)"},{"key":"1160_CR15","doi-asserted-by":"crossref","first-page":"3989","DOI":"10.1109\/TIT.2011.2110950","volume":"57","author":"M Hayashi","year":"2011","unstructured":"Hayashi, M.: Exponential decreasing rate of leaked information in universal random privacy amplification. IEEE Trans. Inf. Theory 57, 3989\u20134001 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"301","key":"1160_CR16","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58(301), 13\u201330 (1963)","journal-title":"J. Am. Stat. Assoc."},{"key":"1160_CR17","doi-asserted-by":"crossref","unstructured":"Johansson, T., Kabatianskii, G., Smeets, B.: On the relation between a-codes and codes correcting independent errors. In: Advances in cryptology, EUROCRYPT 1993, Lecture Notes in Computer Science, vol. 765, pp. 1\u201311. Springer, Berlin (1993)","DOI":"10.1007\/3-540-48285-7_1"},{"key":"1160_CR18","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y. (eds.) CRYPTO \u201994. Lecture Notes in Computer Science, vol. 839, pp. 129\u2013139. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48658-5_15"},{"issue":"5","key":"1160_CR19","doi-asserted-by":"crossref","first-page":"3301","DOI":"10.1103\/PhysRevA.59.3301","volume":"59","author":"N L\u00fctkenhaus","year":"1999","unstructured":"L\u00fctkenhaus, N.: Estimates for practical quantum cryptography. Phys. Rev. A 59(5), 3301\u20133319 (1999). doi: 10.1103\/PhysRevA.59.3301","journal-title":"Phys. Rev. A"},{"key":"1160_CR20","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/BF00264615","volume":"21","author":"K Mehlhorn","year":"1984","unstructured":"Mehlhorn, K., Vishkin, U.: Randomized and deterministic simulations of prams by parallel machines with restricted granularity of parallel memories. Acta Inf. 21, 339\u2013374 (1984)","journal-title":"Acta Inf."},{"key":"1160_CR21","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1996)"},{"issue":"8","key":"1160_CR22","doi-asserted-by":"crossref","first-page":"085,006","DOI":"10.1088\/1367-2630\/11\/8\/085006","volume":"11","author":"J M\u00fcller-Quade","year":"2009","unstructured":"M\u00fcller-Quade, J., Renner, R.: Composability in quantum cryptography. New J. Phys. 11(8), 085,006 (2009)","journal-title":"New J. Phys."},{"key":"1160_CR23","unstructured":"Nguyen, L.H., Roscoe, A.W.: New combinatorial bounds for universal hash functions. Unpublished manuscript (2009). http:\/\/www.cs.ox.ac.uk\/files\/2343\/UniversalHash%20%281%29.pdf , http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.153.6475"},{"issue":"1","key":"1160_CR24","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1142\/S0219749905000797","volume":"3","author":"M Peev","year":"2005","unstructured":"Peev, M., N\u00f6lle, M., Maurhardt, O., Lor\u00fcnser, T., Suda, M., Poppe, A., Ursin, R., Fedrizzi, A., Zeilinger, A.: A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography. Int J. Quantum Inf. 3(1), 225\u2013231 (2005)","journal-title":"Int J. Quantum Inf."},{"issue":"7","key":"1160_CR25","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1142\/S0219749909005729","volume":"7","author":"M Peev","year":"2009","unstructured":"Peev, M., Pacher, C., Lor\u00fcnser, T., N\u00f6lle, M., Poppe, A., Maurhart, O., Suda, M., Fedrizzi, A., Ursin, R., Zeilinger, A.: Response to \u201cVulnerability of \u2018A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography\u201d\u2019. Int J. Quantum Inf. 7(7), 1401\u20131407 (2009)","journal-title":"Int J. Quantum Inf."},{"issue":"8","key":"1160_CR26","doi-asserted-by":"crossref","first-page":"4383","DOI":"10.1109\/TIT.2014.2317312","volume":"60","author":"C Portmann","year":"2014","unstructured":"Portmann, C.: Key recycling in authentication. IEEE Trans. Inf. Theory 60(8), 4383\u20134396 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1160_CR27","doi-asserted-by":"crossref","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (eds.) Proceedings of TCC 2005. Lecture Notes in Computer Science, vol. 3378, pp. 407\u2013425. Springer, Cambridge, MA (2005)","DOI":"10.1007\/978-3-540-30576-7_22"},{"issue":"11","key":"1160_CR28","doi-asserted-by":"crossref","first-page":"10,387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Miki, S., Yamashita, T., Wang, Z., Tanaka, A., Yoshino, K., Nambu, Y., Takahashi, S., Tajima, A., Tomita, A., Domeki, T., Hasegawa, T., Sakai, Y., Kobayashi, H., Asai, T., Shimizu, K., Tokura, T., Tsurumaru, T., Matsui, M., Honjo, T., Tamaki, K., Takesue, H., Tokura, Y., Dynes, J.F., Dixon, A.R., Sharpe, A.W., Yuan, Z.L., Shields, A.J., Uchikoga, S., Legr\u00e9, M., Robyr, S., Trinkler, P., Monat, L., Page, J.B., Ribordy, G., Poppe, A., Allacher, A., Maurhart, O., L\u00e4nger, T., Peev, M., Zeilinger, A.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19(11), 10,387\u201310,409 (2011). doi: 10.1364\/OE.19.010387","journal-title":"Opt. Express"},{"key":"1160_CR29","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dus\u0306ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"1160_CR30","doi-asserted-by":"crossref","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (eds.) CRYPTO \u201996, Springer 1996, Lecture Notes in Computer Science, vol. 1109, pp. 313\u2013328 (1996)","DOI":"10.1007\/3-540-68697-5_24"},{"key":"1160_CR31","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Universal hashing and authentication codes. In: Feigenbaum, J. (eds.) CRYPTO \u201991, Lecture Notes in Computer Science, vol. 576, pp. 74\u201385. Springer, Berlin (1991)","DOI":"10.1007\/3-540-46766-1_5"},{"key":"1160_CR32","doi-asserted-by":"crossref","unstructured":"Taylor, R.: An integrity check value algorithm for stream ciphers. In: Stinson, D. (eds.) Advances in Cryptology\u2014CRYPTO \u201993. Lecture Notes in Computer Science, vol. 773, pp. 40\u201348. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48329-2_4"},{"issue":"3","key":"1160_CR33","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1160-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1160-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1160-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T14:20:33Z","timestamp":1567347633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1160-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,13]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["1160"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1160-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,13]]}}}