Cable Capacitance Attack against the KLJN Secure Key Exchange
暂无分享,去创建一个
Laszlo B. Kish | Yessica Saez | Elias Gonzalez | Hsien-Pu Chen | L. Kish | Elias Gonzalez | Hsien-Pu Chen | Y. Saez
[1] L. Kish,et al. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.
[2] Zoltan Gingl,et al. Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors , 2015, Scientific Reports.
[3] Laszlo B. Kish. PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .
[4] Charles H. Bennett,et al. On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.
[5] Vadim Makarov,et al. Avoiding the blinding attack in QKD , 2010 .
[6] J. Skaar,et al. Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.
[7] Laszlo B. Kish,et al. UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.
[8] Horace P. Yuen. Unconditional Security In Quantum Key Distribution , 2012 .
[9] Laszlo B. Kish. RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .
[10] Laszlo B. Kish,et al. Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.
[11] Adrian Cho,et al. Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.
[12] Robert S. Balog,et al. Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.
[13] Zeeya Merali,et al. Hackers blind quantum cryptographers , 2010 .
[14] Laszlo B. Kish. Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .
[15] Laszlo B. Kish,et al. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.
[16] Laszlo B. Kish,et al. Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.
[17] Osamu Hirota,et al. Incompleteness and Limit of Quantum Key Distribution Theory : Yuen theory vs Renner theory , 2012, 1208.2106.
[18] Vadim Makarov,et al. Controlling an actively-quenched single photon detector with bright light. , 2008, Optics express.
[19] Claes-Goran Granqvist,et al. Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange , 2015, 1509.08150.
[20] H.P. Yuen,et al. Key Generation: Foundations and a New Quantum Approach , 2009, IEEE Journal of Selected Topics in Quantum Electronics.
[21] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[22] Horace P. Yuen,et al. On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .
[23] Vadim Makarov,et al. Superlinear threshold detectors in quantum cryptography , 2011, 1106.2119.
[24] Hoi-Kwong Lo,et al. Measurement-Device-Independent Quantum Cryptography , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[25] J. Skaar,et al. Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.
[26] Janusz Smulko,et al. Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange , 2014 .
[27] J. Skaar,et al. Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.
[28] Ferdinand Peper,et al. Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..
[29] L. B. Kish,et al. Waves in a short cable at low frequencies, or just hand-waving? What does physics say? , 2015, 2015 International Conference on Noise and Fluctuations (ICNF).
[30] V. Makarov. Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.
[31] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[32] Johannes Skaar,et al. Avoiding the blinding attack in QKD , 2010, 1012.0476.
[33] V. Makarov,et al. Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[34] H. Yuen. Essential lack of security proof in quantum key distribution , 2013, 1310.0842.
[35] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[36] Renato Renner,et al. Reply to recent scepticism about the foundations of quantum cryptography , 2012, ArXiv.
[37] Jacob Scheuer,et al. A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .
[38] F. Hao,et al. Kish ’ s key exchange scheme is insecure , 2006 .
[39] Vadim Makarov,et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..
[40] Christian Kurtsiefer,et al. Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.
[41] Laszlo B. Kish,et al. Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.
[42] Xiaolin Cao,et al. Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.
[43] J. Scheuer,et al. Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.
[44] J. Skaar,et al. After-gate attack on a quantum cryptosystem , 2010, 1009.2683.
[45] Robert S. Balog,et al. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.
[46] Laszlo B. Kish,et al. On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.
[47] Horace P. Yuen. Security Significance of the Trace Distance Criterion in Quantum Key Distribution , 2011 .
[48] Laszlo B. Kish,et al. Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.
[49] Laszlo B. Kish,et al. Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2014 .
[50] Laszlo B. Kish,et al. On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..
[51] Kaikai Xu,et al. Increased Efficiency of Silicon Light-Emitting Device in Standard Si-CMOS Technology , 2015, IEEE Journal of Quantum Electronics.
[52] Chiman Kwan,et al. Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.
[53] Andrea Fiore,et al. Waveguide Nanowire Superconducting Single-Photon Detectors Fabricated on GaAs and the Study of Their Optical Properties , 2015, IEEE Journal of Selected Topics in Quantum Electronics.
[54] Shihan Sajeed,et al. Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch , 2015, 1502.02785.
[55] Derek Abbott,et al. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.
[56] Laszlo B. Kish,et al. Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.
[57] L. Kish,et al. TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.
[58] Nicolas Gisin,et al. Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution , 2014, IEEE Journal of Selected Topics in Quantum Electronics.
[59] Jacob Scheuer,et al. Effective privacy amplification for secure classical communications , 2011, ArXiv.
[60] Laszlo B. Kish,et al. Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange , 2013, ArXiv.
[61] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[62] Laszlo B. Kish,et al. Unconditional Security by the Laws of Classical Physics , 2013 .
[63] Laszlo B. Kish,et al. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.