{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:26:49Z","timestamp":1740101209748,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/itw54588.2022.9965816","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T20:47:00Z","timestamp":1670446020000},"page":"452-457","source":"Crossref","is-referenced-by-count":0,"title":["Unconditional Proofs-of-Work and Other Possibilities of Thermodynamic Cryptography"],"prefix":"10.1109","author":[{"given":"Xavier","family":"Coiteux-Roy","sequence":"first","affiliation":[{"name":"Universit&#x00E0; Della Svizzera Italiana,Lugano,Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Wolf","sequence":"additional","affiliation":[{"name":"Universit&#x00E0; Della Svizzera Italiana,Lugano,Switzerland"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2309968"},{"article-title":"Impossibility of composable oblivious transfer in relativistic quantum cryptography","year":"2021","author":"laneve","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref32","article-title":"Construction of a pseudo-random generator from any one-way function","author":"h\u00e5stad","year":"1993","journal-title":"SIAM Journal on Computing"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ab0e3b"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/130913687"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.83.1447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1147\/rd.53.0183"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02084158"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1355-2198(03)00039-X"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms8669"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191321"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1998.743500"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509960"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24638-1_25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2146730"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"ref5","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc IEEE Int Conf Computers Systems and Signal Processing Bangalore India 1984"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.010503"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2329417"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/060651343"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF01341281"},{"article-title":"Key agreement and oblivious transfer from free-energy limitations","year":"2022","author":"coiteux-roy","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0237-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/nature10123"}],"event":{"name":"2022 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2022,11,1]]},"location":"Mumbai, India","end":{"date-parts":[[2022,11,9]]}},"container-title":["2022 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9965754\/9965755\/09965816.pdf?arnumber=9965816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:42:34Z","timestamp":1672083754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9965816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/itw54588.2022.9965816","relation":{},"subject":[],"published":{"date-parts":[[2022,11,1]]}}}