暂无分享,去创建一个
[1] Laszlo B. Kish,et al. Comments On "A New Transient Attack On The Kish Key Distribution System" , 2016, ArXiv.
[2] Laszlo B. Kish,et al. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.
[3] Zoltan Gingl,et al. Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors , 2015, Scientific Reports.
[4] Laszlo B. Kish. RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .
[5] L. Kish,et al. TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.
[6] Laszlo B. Kish,et al. Cable Capacitance Attack against the KLJN Secure Key Exchange , 2015, Inf..
[7] Jacob Scheuer,et al. Effective privacy amplification for secure classical communications , 2011, ArXiv.
[8] Laszlo B. Kish,et al. Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law–Johnson-noise secure key exchange , 2013, ArXiv.
[9] Laszlo B. Kish,et al. UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.
[10] Laszlo B. Kish,et al. Unconditionally secure communication via wire , 2007 .
[11] J. Scheuer,et al. Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.
[12] Pao-Lo Liu. A new look at the classical key exchange system based on amplified Johnson noise , 2009 .
[13] Ferdinand Peper,et al. Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..
[14] Jacob Scheuer,et al. A classical key-distribution system based on Johnson (like) noise—How secure? , 2006 .
[15] L. B. Kish,et al. Waves in a short cable at low frequencies, or just hand-waving? What does physics say? , 2015, 2015 International Conference on Noise and Fluctuations (ICNF).
[16] F. Hao,et al. Kish ’ s key exchange scheme is insecure , 2006 .
[17] Laszlo B. Kish,et al. Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.
[18] Claes-Goran Granqvist,et al. Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange , 2015, 1509.08150.
[19] Laszlo B. Kish,et al. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.
[20] Derek Abbott,et al. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.
[21] Xiaolin Cao,et al. On KLJN-based secure key distribution in vehicular communication networks , 2014, The Random and Fluctuating World.
[22] Laszlo B. Kish,et al. Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.
[23] Robert S. Balog,et al. Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.
[24] Robert Mingesz,et al. Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System , 2014, PloS one.
[25] Chiman Kwan,et al. Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.
[26] Laszlo B. Kish,et al. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange , 2015, ArXiv.
[27] Laszlo B. Kish,et al. Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.
[28] Laszlo B. Kish,et al. Random-resistor-random-temperature KLJN key exchange , 2015, ArXiv.
[29] Xiaolin Cao,et al. Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.
[30] Laszlo B. Kish,et al. On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..
[31] Janusz Smulko,et al. Performance Analysis of the "Intelligent" Kirchhoff-Law–Johnson-Noise Secure Key Exchange , 2014 .
[32] Adrian Cho,et al. Simple Noise May Stymie Spies Without Quantum Weirdness , 2005, Science.
[33] Laszlo B. Kish,et al. On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.
[34] Laszlo B. Kish,et al. Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.
[35] Laszlo B. Kish,et al. Bit Errors in the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2014 .
[36] L. Kish,et al. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.
[37] Laszlo B. Kish. PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .
[38] Charles H. Bennett,et al. On the security of key distribution based on Johnson-Nyquist noise , 2013, ArXiv.
[39] Derek Abbott,et al. A New Transient Attack on the Kish Key Distribution System , 2015, IEEE Access.
[40] Janusz Smulko. Performance analysis of the “intelligent” Kirchhoff-Law-Johnson-Noise secure key exchange , 2014 .
[41] Robert S. Balog,et al. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.
[42] Derek Abbott,et al. A directional wave measurement attack against the Kish key distribution system , 2014, Scientific Reports.
[43] Laszlo B. Kish,et al. Enhanced usage of keys obtained by physical, unconditionally secure distributions , 2014, ArXiv.
[44] Laszlo B. Kish,et al. Unconditional Security by the Laws of Classical Physics , 2013 .
[45] Laszlo B. Kish. Response to Scheuer-Yariv: "A Classical Key-Distribution System based on Johnson (like) noise -How Secure?" - short response , 2006 .
[46] Laszlo B. Kish,et al. Errors and Their Mitigation at the Kirchhoff-Law-Johnson-Noise Secure Key Exchange , 2013, PloS one.