{"id":"https://openalex.org/W4410761511","doi":"https://doi.org/10.3390/cryptography9020034","title":"QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things","display_name":"QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things","publication_year":2025,"publication_date":"2025-05-27","ids":{"openalex":"https://openalex.org/W4410761511","doi":"https://doi.org/10.3390/cryptography9020034"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9020034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020034","pdf_url":"https://www.mdpi.com/2410-387X/9/2/34/pdf?version=1748348153","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/2/34/pdf?version=1748348153","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036912928","display_name":"Venkata K. V. V. Bathalapalli","orcid":"https://orcid.org/0000-0002-4487-3239"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Venkata K. V. V. Bathalapalli","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA"],"raw_orcid":"https://orcid.org/0000-0002-4487-3239","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saraju P. Mohanty","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA"],"raw_orcid":"https://orcid.org/0000-0003-2959-6541","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, Denton, TX 76207, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064738995","display_name":"Chenyun Pan","orcid":"https://orcid.org/0000-0001-9161-1728"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenyun Pan","raw_affiliation_strings":["Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX 76019, USA"],"raw_orcid":"https://orcid.org/0000-0001-9161-1728","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX 76019, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062843590","display_name":"Elias Kougianos","orcid":"https://orcid.org/0000-0002-1616-7628"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elias Kougianos","raw_affiliation_strings":["Department of Electrical Engineering, University of North Texas, Denton, TX 76207, USA"],"raw_orcid":"https://orcid.org/0000-0002-1616-7628","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of North Texas, Denton, TX 76207, USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036912928","https://openalex.org/A5062843590","https://openalex.org/A5070359867"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":8.6185,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.97470437,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"9","issue":"2","first_page":"34","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10558","display_name":"Advancements in Semiconductor Devices and Circuit Design","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5571696162223816},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.5309991836547852},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5124278664588928},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49527230858802795},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.4571492671966553},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3330296277999878},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3233761489391327}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5571696162223816},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.5309991836547852},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5124278664588928},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49527230858802795},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.4571492671966553},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3330296277999878},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3233761489391327}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography9020034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020034","pdf_url":"https://www.mdpi.com/2410-387X/9/2/34/pdf?version=1748348153","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:info:ark/67531/metadc2564961","is_oa":false,"landing_page_url":"https://digital.library.unt.edu/ark:/67531/metadc2564961/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400792","display_name":"University of North Texas Digital Library (University of North Texas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I123534392","host_organization_name":"University of North Texas","host_organization_lineage":["https://openalex.org/I123534392"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, 9(2), Multidisciplinary Digital Publishing Institute, May 27, 2025, p. 1-20","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:2990e71ec46b46d7978d7fc8dc472ba4","is_oa":true,"landing_page_url":"https://doaj.org/article/2990e71ec46b46d7978d7fc8dc472ba4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 2, p 34 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9020034","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9020034","pdf_url":"https://www.mdpi.com/2410-387X/9/2/34/pdf?version=1748348153","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410761511.pdf","grobid_xml":"https://content.openalex.org/works/W4410761511.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2767874523","https://openalex.org/W2896685021","https://openalex.org/W2919670389","https://openalex.org/W3129043781","https://openalex.org/W3130731369","https://openalex.org/W3153074989","https://openalex.org/W3161792009","https://openalex.org/W3166055771","https://openalex.org/W4205425744","https://openalex.org/W4293731890","https://openalex.org/W4310034831","https://openalex.org/W4321020851","https://openalex.org/W4321608321","https://openalex.org/W4323041315","https://openalex.org/W4378801031","https://openalex.org/W4380991154","https://openalex.org/W4386474820","https://openalex.org/W4388768155","https://openalex.org/W4390224960","https://openalex.org/W4393099944","https://openalex.org/W4404031829","https://openalex.org/W4405271813","https://openalex.org/W4405741944","https://openalex.org/W4405908615","https://openalex.org/W4406261408","https://openalex.org/W4410761511","https://openalex.org/W6801051695","https://openalex.org/W6847480640"],"related_works":["https://openalex.org/W4386278306","https://openalex.org/W2010558539","https://openalex.org/W2580259249","https://openalex.org/W3096667951","https://openalex.org/W4288068867","https://openalex.org/W102880045","https://openalex.org/W2594513438","https://openalex.org/W3212933010","https://openalex.org/W4390610562","https://openalex.org/W4400212587"],"abstract_inverted_index":{"This":[0,50,105],"research":[1,106],"investigates":[2],"the":[3,13,37,53,62,83,93,101,115,136,168,179,196,213],"integration":[4],"of":[5,40,55,87,96,118,175],"quantum":[6,41,97,102,140,158,181,210],"hardware-assisted":[7],"security":[8,34,69,84,112,219],"into":[9],"critical":[10],"applications,":[11],"including":[12],"Industrial":[14,63,124],"Internet-of-Things":[15,64,125],"(IIoT),":[16,65],"Smart":[17,20],"Grid,":[18],"and":[19,46,73,85,110,160,171,192,205],"Transportation.":[21],"The":[22,148,164],"Quantum":[23,56,78,88,123],"Physical":[24],"Unclonable":[25],"Functions":[26],"(QPUF)":[27],"architecture":[28],"has":[29,153],"emerged":[30],"as":[31,70],"a":[32,71,108],"robust":[33],"paradigm,":[35],"harnessing":[36],"inherent":[38,74],"randomness":[39,170],"hardware":[42],"to":[43,67,132,143],"generate":[44,144],"unique":[45],"tamper-resistant":[47,146],"cryptographic":[48],"fingerprints.":[49,147],"work":[51],"explores":[52],"potential":[54,215],"Computing":[57,79],"for":[58,114,162],"Security-by-Design":[59],"(SbD)":[60],"in":[61,77,122,216],"aiming":[66],"establish":[68],"fundamental":[72,94],"feature.":[75],"SbD":[76],"focuses":[80],"on":[81,156,178,201,208],"ensuring":[82],"privacy":[86],"computing":[89,103],"applications":[90,127],"by":[91],"leveraging":[92],"principles":[95,142],"mechanics,":[98],"which":[99,138],"underpin":[100],"infrastructure.":[104],"presents":[107],"scalable":[109],"sustainable":[111],"framework":[113],"trusted":[116],"attestation":[117],"smart":[119],"industrial":[120],"entities":[121],"(QIoT)":[126],"within":[128],"Industry":[129],"4.0.":[130],"Central":[131],"this":[133],"approach":[134],"is":[135],"QPUF,":[137],"leverages":[139],"mechanical":[141],"unique,":[145],"proposed":[149],"QPUF":[150],"circuit":[151,197],"logic":[152],"been":[154],"deployed":[155],"IBM":[157,180],"systems":[159],"simulators":[161],"validation.":[163],"experimental":[165],"results":[166],"demonstrate":[167],"enhanced":[169],"an":[172],"intra-hamming":[173],"distance":[174],"approximately":[176],"50%":[177],"hardware,":[182],"along":[183],"with":[184],"improved":[185],"reliability":[186,200,207],"despite":[187],"varying":[188],"error":[189],"rates,":[190],"coherence,":[191],"decoherence":[193],"times.":[194],"Furthermore,":[195],"achieved":[198],"100%":[199],"Google\u2019s":[202],"Cirq":[203],"simulator":[204],"95%":[206],"IBM\u2019s":[209],"simulator,":[211],"highlighting":[212],"QPUF\u2019s":[214],"advancing":[217],"quantum-centric":[218],"solutions.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
