Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System
暂无分享,去创建一个
[1] Laszlo B. Kish,et al. Unconditional Security by the Laws of Classical Physics , 2013 .
[2] Derek Abbott,et al. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.
[3] Laszlo B. Kish. RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .
[4] L. Kish,et al. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.
[5] Charles H. Bennett,et al. On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.
[6] Robert S. Balog,et al. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.
[7] Sunil P. Khatri,et al. A novel cryptographic key exchange scheme using resistors , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).
[8] J. Scheuer,et al. Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.
[9] Chiman Kwan,et al. Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.
[10] Laszlo B. Kish,et al. Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.
[11] Laszlo B. Kish,et al. Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.
[12] Laszlo B. Kish,et al. UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.
[13] Pao-Lo Liu,et al. A Key Agreement Protocol Using Band-Limited Random Signals and Feedback , 2009, Journal of Lightwave Technology.
[14] Laszlo B. Kish. Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .
[15] Laszlo B. Kish,et al. Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.
[16] Jacob Scheuer,et al. A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .
[17] F. Hao,et al. Kish ’ s key exchange scheme is insecure , 2006 .
[18] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[19] Laszlo B. Kish,et al. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.