-
1
-
-
77953527470
-
-
Full version, available at Report 2009/369
-
Full version, available at Cryptology ePrint Archive, Report 2009/369 (2009)
-
(2009)
Cryptology ePrint Archive
-
-
-
3
-
-
4243059985
-
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels
-
Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895-1899 (1993)
-
(1993)
Phys. Rev. Lett.
, vol.70
, pp. 1895-1899
-
-
Bennett, C.H.1
Brassard, G.2
Crépeau, C.3
Jozsa, R.4
Peres, A.5
Wootters, W.K.6
-
4
-
-
23444435831
-
Forgery: 'Fingerprinting' documents and packaging
-
Buchanan, J.D.R., Cowburn, R.P., Jausovec, A., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D.A., Bryan, M.T.: Forgery: 'fingerprinting' documents and packaging. Nature, Brief Communications 436, 475 (2005)
-
(2005)
Nature, Brief Communications
, vol.436
, pp. 475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.3
Petit, D.4
Seem, P.5
Xiong, G.6
Atkinson, D.7
Fenton, K.8
Allwood, D.A.9
Bryan, M.T.10
-
6
-
-
55849120197
-
Anti-counterfeiting with a random pattern
-
IEEE, Los Alamitos
-
Chong, C.N., Jiang, D., Zhang, J., Guo, L.: Anti-counterfeiting with a random pattern. In: SECURWARE 2008, pp. 146-153. IEEE, Los Alamitos (2008)
-
(2008)
Securware 2008
, pp. 146-153
-
-
Chong, C.N.1
Jiang, D.2
Zhang, J.3
Guo, L.4
-
7
-
-
44449149774
-
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Cramer, R., Dodis, Y., Fehr, S., Padró, C.,Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 471-488. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 471-488
-
-
Cramer, R.1
Dodis, Y.2
Fehr, S.3
Padró, C.4
Wichs, D.5
-
10
-
-
0035936121
-
Long-distance quantum communication with atomic ensembles and linear optics
-
DOI 10.1038/35106500
-
Duan, L.M., Lukin, M., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413-418 (2001) (Pubitemid 34173718)
-
(2001)
Nature
, vol.414
, Issue.6862
, pp. 413-418
-
-
Duan, L.-M.1
Lukin, M.D.2
Cirac, J.I.3
Zoller, P.4
-
11
-
-
0343152990
-
Quantum cryptography based on Bells theorem
-
Ekert, A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67, 661-663 (1991)
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661-663
-
-
Ekert, A.K.1
-
12
-
-
0038341105
-
Silicon physical unknown functions
-
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical unknown functions. In: ACM Conf. on Computer and Communications Security - CCS 2002, November 2002, pp. 148-160 (2002)
-
(2002)
ACM Conf. on Computer and Communications Security - CCS 2002, November 2002
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.E.2
Van Dijk, M.3
Devadas, S.4
-
14
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63-80. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
15
-
-
0041415963
-
Quantum key distribution with high loss: Toward global secure communication
-
Hwang, W.-Y.: Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)
-
(2003)
Phys. Rev. Lett.
, vol.91
, pp. 057901
-
-
Hwang, W.-Y.1
-
16
-
-
0037101027
-
Differential phase shift quantum key distribution
-
Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89, 037902 (2002)
-
(2002)
Phys. Rev. Lett.
, vol.89
, pp. 037902
-
-
Inoue, K.1
Waks, E.2
Yamamoto, Y.3
-
17
-
-
3242793330
-
Toward an automated verification of certificates of authenticity
-
ACM, New York
-
Kirovski, D.: Toward an automated verification of certificates of authenticity. In: ACM Conference on Electronic Commerce, pp. 160-169. ACM, New York (2004)
-
(2004)
ACM Conference on Electronic Commerce
, pp. 160-169
-
-
Kirovski, D.1
-
18
-
-
51849144293
-
The Butterfly PUF: Protecting IP on every FPGA
-
IEEE, Los Alamitos
-
Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The Butterfly PUF: Protecting IP on every FPGA. In: HOST 2008, pp. 67-70. IEEE, Los Alamitos (2008)
-
(2008)
HOST 2008
, pp. 67-70
-
-
Kumar, S.S.1
Guajardo, J.2
Maes, R.3
Schrijen, G.J.4
Tuyls, P.5
-
19
-
-
70449096107
-
Reconfigurable physical unclonable functions
-
Kursawe, K., Sadeghi, A.-R., Schellekens, D., Škorić, B., Tuyls, P.: Reconfigurable physical unclonable functions. In: HOST 2009 (2009)
-
(2009)
Host 2009
-
-
Kursawe, K.1
Sadeghi, A.-R.2
Schellekens, D.3
Škorić, B.4
Tuyls, P.5
-
20
-
-
7444262890
-
Quantum state transfer between matter and light
-
Matsukevich, D.N., Kuzmich, A.: Quantum state transfer between matter and light. Science 306(5696), 663-666 (2004)
-
(2004)
Science
, vol.306
, Issue.5696
, pp. 663-666
-
-
Matsukevich, D.N.1
Kuzmich, A.2
-
22
-
-
0037144430
-
Physical One-Way Functions
-
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science 297, 2026-2030 (2002)
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershenfeld, N.4
-
24
-
-
0035911757
-
Quantum key distribution and quantum authentication based on entangled state
-
Shi, B.S., Li, J., Liu, J.M., Fan, X.F., Guo, G.C.: Quantum key distribution and quantum authentication based on entangled state. Phys. Lett. A 281, 83-87 (2001)
-
(2001)
Phys. Lett. A
, vol.281
, pp. 83-87
-
-
Shi, B.S.1
Li, J.2
Liu, J.M.3
Fan, X.F.4
Guo, G.C.5
-
25
-
-
0000410707
-
Universal hashing and authentication codes
-
Stinson, D.R.: Universal hashing and authentication codes. Designs, Codes, and Cryptography 4, 369-380 (1994)
-
(1994)
Designs, Codes, and Cryptography
, vol.4
, pp. 369-380
-
-
Stinson, D.R.1
-
26
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Goubin, L., Matsui, M. (eds.) CHES 2006. Springer, Heidelberg
-
Tuyls, P., Schrijen, G.J., Škorić, B., van Geloven, J., Verhaegh, R., Wolters, R.: Read-proof hardware from protective coatings. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 369-383. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.J.2
Škorić, B.3
Van Geloven, J.4
Verhaegh, R.5
Wolters, R.6
-
27
-
-
84892351140
-
-
Springer, London
-
Tuyls, P., Škorić, B., Kevenaar, T.: Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer, London (2007)
-
(2007)
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
-
Tuyls, P.1
Škorić, B.2
Kevenaar, T.3
-
28
-
-
26444487655
-
Informationtheoretic security analysis of physical uncloneable functions
-
S. Patrick, A., Yung, M. (eds.) FC 2005. Springer, Heidelberg
-
Tuyls, P., Škorić, B., Stallinga, S., Akkermans, A.H.M., Ophey, W.: Informationtheoretic security analysis of physical uncloneable functions. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 141-155. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3570
, pp. 141-155
-
-
Tuyls, P.1
Škorić, B.2
Stallinga, S.3
Akkermans, A.H.M.4
Ophey, W.5
-
29
-
-
44449165608
-
On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle
-
Škorić, B.: On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle. Journal of Optics A: Pure and Applied Optics 10(5), 055304-055316 (2008)
-
(2008)
Journal of Optics A: Pure and Applied Optics
, vol.10
, Issue.5
, pp. 55304-55316
-
-
Škorić, B.1
-
30
-
-
79960848452
-
Randomized resonators as uniquely identifiable anti-counterfeiting tags
-
Škorić, B., Bel, T., Blom, A.H.M., de Jong, B.R., Kretschman, H., Nellissen, A.J.M.: Randomized resonators as uniquely identifiable anti-counterfeiting tags. In: Secure Component and System Identification Workshop, Berlin (March 2008)
-
Secure Component and System Identification Workshop, Berlin (March 2008)
-
-
Škorić, B.1
Bel, T.2
Blom, A.H.M.3
De Jong, B.R.4
Kretschman, H.5
Nellissen, A.J.M.6
-
31
-
-
33746708860
-
A single quantum cannot be cloned
-
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802-803 (1982)
-
(1982)
Nature
, vol.299
, pp. 802-803
-
-
Wootters, W.K.1
Zurek, W.H.2
|