Authenticated communication from quantum readout of pufs
From MaRDI portal
Recommendations
- Quantum readout of physical unclonable functions
- Quantum readout of physical unclonable functions
- Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks
- Quantum cloning attacks against PUF-based quantum authentication systems
- Unconditionally-secure and reusable public-key authentication
Cites work
- scientific article; zbMATH DE number 2114384 (Why is no real title available?)
- A panorama of post-quantum cryptography
- A single quantum cannot be cloned
- Position-based quantum cryptography: impossibility and constructions
- Post-Quantum Cryptography
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography beyond quantum key distribution
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography: public key distribution and coin tossing
- Quantum readout of physical unclonable functions
- SPHINCS: practical stateless hash-based signatures
- Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks
- Universal Algorithm for Optimal Estimation of Quantum States from Finite Ensembles via Realizable Generalized Measurement
Cited in
(4)
This page was built for publication: Authenticated communication from quantum readout of pufs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1700008)