{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T13:22:24Z","timestamp":1768742544319,"version":"3.49.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,12,18]],"date-time":"2016-12-18T00:00:00Z","timestamp":1482019200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11128-016-1468-8","type":"journal-article","created":{"date-parts":[[2016,12,18]],"date-time":"2016-12-18T02:14:36Z","timestamp":1482027276000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Cryptanalysis on authenticated semi-quantum key distribution protocol using Bell states"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1954-9792","authenticated-orcid":false,"given":"A.","family":"Meslouhi","sequence":"first","affiliation":[]},{"given":"Y.","family":"Hassouni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,18]]},"reference":[{"key":"1468_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, (IEEE, New York), pp. 175\u2013179 (1984)"},{"key":"1468_CR2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3\u201328 (1992)","journal-title":"J. Cryptol."},{"key":"1468_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1468_CR4","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1992","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1468_CR5","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"1468_CR6","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1468_CR7","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1468_CR8","doi-asserted-by":"crossref","first-page":"227901","DOI":"10.1103\/PhysRevLett.91.227901","volume":"91","author":"M Barbieri","year":"2003","unstructured":"Barbieri, M., De Martini, F., Di Nepi, G., Mataloni, P., D\u2019Ariano, G.M., Macchiavello, C.: Detection of entanglement with polarized photons: experimental realization of an entanglement witness. Phys. Rev. Lett. 91, 227901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1468_CR9","doi-asserted-by":"crossref","first-page":"170502","DOI":"10.1103\/PhysRevLett.96.170502","volume":"96","author":"O G\u00fchne","year":"2006","unstructured":"G\u00fchne, O., L\u00fctkenhaus, N.: Nonlinear entanglement witnesses. Phys. Rev. Lett. 96, 170502 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"1468_CR10","volume-title":"The Story of Secrete Writing, in the Codebreakers","author":"D Kahn","year":"1996","unstructured":"Kahn, D.: The Story of Secrete Writing, in the Codebreakers. Scribner, New York (1996)"},{"key":"1468_CR11","unstructured":"Wright, P.: Spycatcher: the Candid Autobiography of a Senior Intelligence Officer. Viking, New York (1987)"},{"key":"1468_CR12","unstructured":"Benson, R.L., Warner, M.: Introduction to Venona: Soviet Espionage and The American Response. Central Intelligence Agency, Washington, DC (1996)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1468-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1468-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1468-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:09:23Z","timestamp":1498356563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1468-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,18]]},"references-count":12,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["1468"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1468-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,18]]},"article-number":"18"}}