BibTeX records: Laszlo B. Kish

download as .bib file

@article{DBLP:journals/corr/abs-2404-16849,
  author       = {Kate Davis and
                  Laszlo B. Kish and
                  Chanan Singh},
  title        = {Smart Grids Secured By Dynamic Watermarking: How Secure?},
  journal      = {CoRR},
  volume       = {abs/2404.16849},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.16849},
  doi          = {10.48550/ARXIV.2404.16849},
  eprinttype    = {arXiv},
  eprint       = {2404.16849},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-16849.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-15494,
  author       = {Mehmet Yildirim and
                  Nasir Kenarangui and
                  Robert S. Balog and
                  Laszlo B. Kish and
                  Chanan Singh},
  title        = {Simple Cracking of (Noise-Based) Dynamic Watermarking in Smart Grids},
  journal      = {CoRR},
  volume       = {abs/2406.15494},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.15494},
  doi          = {10.48550/ARXIV.2406.15494},
  eprinttype    = {arXiv},
  eprint       = {2406.15494},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-15494.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-05607,
  author       = {Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {Transient Attack against the {KLJN} Secure Key Exchanger},
  journal      = {CoRR},
  volume       = {abs/2302.05607},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.05607},
  doi          = {10.48550/ARXIV.2302.05607},
  eprinttype    = {arXiv},
  eprint       = {2302.05607},
  timestamp    = {Sun, 19 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-05607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-06449,
  author       = {Mohammad B. Khreishah and
                  Walter C. Daugherity and
                  Laszlo B. Kish},
  title        = {{XOR} and {XNOR} gates in instantaneous noise based logic},
  journal      = {CoRR},
  volume       = {abs/2302.06449},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.06449},
  doi          = {10.48550/ARXIV.2302.06449},
  eprinttype    = {arXiv},
  eprint       = {2302.06449},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-06449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-00984,
  author       = {Laszlo B. Kish},
  title        = {Ternary Instantaneous Noise-based Logic},
  journal      = {CoRR},
  volume       = {abs/2305.00984},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.00984},
  doi          = {10.48550/ARXIV.2305.00984},
  eprinttype    = {arXiv},
  eprint       = {2305.00984},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-00984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04899,
  author       = {Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {Transient Attacks against the {VMG-KLJN} Secure Key Exchanger},
  journal      = {CoRR},
  volume       = {abs/2309.04899},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04899},
  doi          = {10.48550/ARXIV.2309.04899},
  eprinttype    = {arXiv},
  eprint       = {2309.04899},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04899.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00031,
  author       = {Laszlo B. Kish},
  title        = {Crypto analysis of the key distribution scheme using noise-free resistances},
  journal      = {CoRR},
  volume       = {abs/2312.00031},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00031},
  doi          = {10.48550/ARXIV.2312.00031},
  eprinttype    = {arXiv},
  eprint       = {2312.00031},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-05675,
  author       = {Laszlo B. Kish},
  title        = {Time synchronization protocol for the {KLJN} secure key exchange scheme},
  journal      = {CoRR},
  volume       = {abs/2207.05675},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.05675},
  doi          = {10.48550/ARXIV.2207.05675},
  eprinttype    = {arXiv},
  eprint       = {2207.05675},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-05675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-05121,
  author       = {Shahriar Ferdous and
                  Christiana Chamon and
                  Laszlo B. Kish},
  title        = {Current injection and voltage insertion attacks against the {VMG-KLJN}
                  secure key exchanger},
  journal      = {CoRR},
  volume       = {abs/2210.05121},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.05121},
  doi          = {10.48550/ARXIV.2210.05121},
  eprinttype    = {arXiv},
  eprint       = {2210.05121},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-05121.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-12592,
  author       = {Christiana Chamon and
                  Laszlo B. Kish},
  title        = {Perspective - On the thermodynamics of perfect unconditional security},
  journal      = {CoRR},
  volume       = {abs/2105.12592},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.12592},
  eprinttype    = {arXiv},
  eprint       = {2105.12592},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-12592.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-09370,
  author       = {Christiana Chamon and
                  Laszlo B. Kish},
  title        = {Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise {(KLJN)}
                  Secure Key Exchange Protocol},
  journal      = {CoRR},
  volume       = {abs/2108.09370},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.09370},
  eprinttype    = {arXiv},
  eprint       = {2108.09370},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-09370.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-01137,
  author       = {Jiaao Song and
                  Laszlo B. Kish},
  title        = {From cold resistor to secure key exchanger},
  journal      = {CoRR},
  volume       = {abs/2110.01137},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.01137},
  eprinttype    = {arXiv},
  eprint       = {2110.01137},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-01137.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-03088,
  author       = {Christiana Chamon and
                  Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
                  {(KLJN)} Secure Key Exchange Protocol},
  journal      = {CoRR},
  volume       = {abs/2110.03088},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.03088},
  eprinttype    = {arXiv},
  eprint       = {2110.03088},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-03088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/ScandurraSK20,
  author       = {Graziella Scandurra and
                  Janusz M. Smulko and
                  Laszlo B. Kish},
  title        = {Fluctuation-Enhanced Sensing},
  journal      = {J. Sensors},
  volume       = {2020},
  pages        = {6108347:1--6108347:2},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/6108347},
  doi          = {10.1155/2020/6108347},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/ScandurraSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-03369,
  author       = {Mutaz Y. Melhem and
                  Laszlo B. Kish},
  title        = {Man in the middle and current injection attacks against the {KLJN}
                  key exchanger compromised by {DC} sources},
  journal      = {CoRR},
  volume       = {abs/2004.03369},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.03369},
  eprinttype    = {arXiv},
  eprint       = {2004.03369},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-03369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-10429,
  author       = {Christiana Chamon and
                  Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
                  Secure Key Exchange Protocol},
  journal      = {CoRR},
  volume       = {abs/2005.10429},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.10429},
  eprinttype    = {arXiv},
  eprint       = {2005.10429},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-10429.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11002,
  author       = {Mutaz Y. Melhem and
                  Christiana Chamon and
                  Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {{AC} Loop Current Attacks Against The {KLJN} Secure Key Exchange Scheme},
  journal      = {CoRR},
  volume       = {abs/2005.11002},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11002},
  eprinttype    = {arXiv},
  eprint       = {2005.11002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-04280,
  author       = {Shahriar Ferdous and
                  Christiana Chamon and
                  Laszlo B. Kish},
  title        = {Comments on the "Generalized" {KLJN} Key Exchanger with
                  Arbitrary Resistors: Power, Impedance, Security},
  journal      = {CoRR},
  volume       = {abs/2010.04280},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.04280},
  eprinttype    = {arXiv},
  eprint       = {2010.04280},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-04280.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02848,
  author       = {Christiana Chamon and
                  Shahriar Ferdous and
                  Laszlo B. Kish},
  title        = {Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
                  Secure Key Exchange Protocol},
  journal      = {CoRR},
  volume       = {abs/2012.02848},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02848},
  eprinttype    = {arXiv},
  eprint       = {2012.02848},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02848.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-03162,
  author       = {Laszlo B. Kish and
                  Walter Daugherity},
  title        = {Entanglement, and unsorted database search in noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1905.03162},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.03162},
  eprinttype    = {arXiv},
  eprint       = {1905.03162},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-03162.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00974,
  author       = {Mutaz Y. Melhem and
                  Laszlo B. Kish},
  title        = {Generalized {DC} loop current attack against the {KLJN} secure key
                  exchange scheme},
  journal      = {CoRR},
  volume       = {abs/1910.00974},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00974},
  eprinttype    = {arXiv},
  eprint       = {1910.00974},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/KwanK18,
  author       = {Chiman Kwan and
                  Laszlo B. Kish},
  title        = {Unconditionally Secure Control and Diagnostic Systems},
  booktitle    = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Washington, DC, USA, October 21-23, 2018},
  pages        = {5686--5691},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IECON.2018.8591266},
  doi          = {10.1109/IECON.2018.8591266},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/KwanK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/KwanKSC18,
  author       = {Chiman Kwan and
                  Laszlo B. Kish and
                  Yessica Saez and
                  Xiaolin Cao},
  title        = {Low Cost and Unconditionally Secure Communications for Complex {UAS}
                  Networks},
  booktitle    = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Washington, DC, USA, October 21-23, 2018},
  pages        = {5895--5900},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IECON.2018.8591080},
  doi          = {10.1109/IECON.2018.8591080},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/KwanKSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09671,
  author       = {Laszlo B. Kish and
                  Walter Daugherity},
  title        = {Noise-based logic gates by operations on the reference system},
  journal      = {CoRR},
  volume       = {abs/1803.09671},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09671},
  eprinttype    = {arXiv},
  eprint       = {1803.09671},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09671.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-05596,
  author       = {Mutaz Y. Melhem and
                  Laszlo B. Kish},
  title        = {A Static-Loop-Current Attack against the {KLJN} Secure Key Exchange
                  System},
  journal      = {CoRR},
  volume       = {abs/1806.05596},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.05596},
  eprinttype    = {arXiv},
  eprint       = {1806.05596},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-05596.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ws/Kish17,
  author       = {Laszlo B. Kish},
  title        = {The Kish Cypher - The Story of {KLJN} for Unconditional Security},
  publisher    = {WorldScientific},
  year         = {2017},
  url          = {https://doi.org/10.1142/8707},
  doi          = {10.1142/8707},
  isbn         = {9789814449458},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ws/Kish17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/GrigorievKS17,
  author       = {Dima Grigoriev and
                  Laszlo B. Kish and
                  Vladimir Shpilrain},
  title        = {Yao's Millionaires' Problem and Public-Key Encryption Without Computational
                  Assumptions},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {28},
  number       = {4},
  pages        = {379--390},
  year         = {2017},
  url          = {https://doi.org/10.1142/S012905411750023X},
  doi          = {10.1142/S012905411750023X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/GrigorievKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/ZhangKG17,
  author       = {Bruce Zhang and
                  Laszlo Bela Kish and
                  Claes{-}G{\"{o}}ran Granqvist},
  title        = {Drawing from hats by noise-based logic},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {32},
  number       = {3},
  pages        = {244--251},
  year         = {2017},
  url          = {https://doi.org/10.1080/17445760.2016.1140168},
  doi          = {10.1080/17445760.2016.1140168},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/ZhangKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SundqvistK17,
  author       = {Kyle Sundqvist and
                  Laszlo B. Kish},
  title        = {Is the memristor always a passive device?},
  journal      = {CoRR},
  volume       = {abs/1703.09064},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.09064},
  eprinttype    = {arXiv},
  eprint       = {1703.09064},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SundqvistK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijuc/LeePCNOKTSKK16,
  author       = {Jia Lee and
                  Ferdinand Peper and
                  Sorin Dan Cotofana and
                  Makoto Naruse and
                  Motoichi Ohtsu and
                  Tadashi Kawazoe and
                  Yasuo Takahashi and
                  Tetsuya Shimokawa and
                  Laszlo B. Kish and
                  Tohru Kubota},
  title        = {Brownian Circuits: Designs},
  journal      = {Int. J. Unconv. Comput.},
  volume       = {12},
  number       = {5-6},
  pages        = {341--362},
  year         = {2016},
  url          = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-12-number-5-6-2016/ijuc-12-5-6-p-341-362/},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijuc/LeePCNOKTSKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishGKP16,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist and
                  Sunil P. Khatri and
                  Ferdinand Peper},
  title        = {Response to "Comment on 'Zero and negative energy dissipation
                  at information-theoretic erasure'"},
  journal      = {CoRR},
  volume       = {abs/1602.02638},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.02638},
  eprinttype    = {arXiv},
  eprint       = {1602.02638},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishGKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishEGK16,
  author       = {Laszlo Bela Kish and
                  Kamran Entesari and
                  Claes{-}Goran Granqvist and
                  Chiman Kwan},
  title        = {Unconditionally secure credit/debit card chip scheme and physical
                  unclonable function},
  journal      = {CoRR},
  volume       = {abs/1605.02355},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.02355},
  eprinttype    = {arXiv},
  eprint       = {1605.02355},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishEGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishG16,
  author       = {Laszlo Bela Kish and
                  Claes{-}Goran Granqvist},
  title        = {Comments On "A New Transient Attack On The Kish Key Distribution
                  System"},
  journal      = {CoRR},
  volume       = {abs/1606.02697},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.02697},
  eprinttype    = {arXiv},
  eprint       = {1606.02697},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kish16,
  author       = {Laszlo B. Kish},
  title        = {Comments on "sub-KBT micro-electromechanical irreversible logic
                  gate"},
  journal      = {CoRR},
  volume       = {abs/1606.09493},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.09493},
  eprinttype    = {arXiv},
  eprint       = {1606.09493},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kish16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/GonzalezBK15,
  author       = {Elias Gonzalez and
                  Robert S. Balog and
                  Laszlo B. Kish},
  title        = {Resource Requirements and Speed \emph{versus }Geometry of Unconditionally
                  Secure Physical Key Exchanges},
  journal      = {Entropy},
  volume       = {17},
  number       = {4},
  pages        = {2010--2024},
  year         = {2015},
  url          = {https://doi.org/10.3390/e17042010},
  doi          = {10.3390/E17042010},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/GonzalezBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/ChenGSK15,
  author       = {Hsien{-}Pu Chen and
                  Elias Gonzalez and
                  Yessica Saez and
                  Laszlo B. Kish},
  title        = {Cable Capacitance Attack against the {KLJN} Secure Key Exchange},
  journal      = {Inf.},
  volume       = {6},
  number       = {4},
  pages        = {719--732},
  year         = {2015},
  url          = {https://doi.org/10.3390/info6040719},
  doi          = {10.3390/INFO6040719},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/ChenGSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GonzalezBK15,
  author       = {Elias Gonzalez and
                  Robert S. Balog and
                  Laszlo B. Kish},
  title        = {Resource requirements and speed versus geometry of unconditionally
                  secure physical key exchanges},
  journal      = {CoRR},
  volume       = {abs/1504.06541},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.06541},
  eprinttype    = {arXiv},
  eprint       = {1504.06541},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GonzalezBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishGKP15,
  author       = {Laszlo B. Kish and
                  Claes{-}G{\"{o}}ran Granqvist and
                  Sunil P. Khatri and
                  Ferdinand Peper},
  title        = {Zero and negative energy dissipation at information-theoretic erasure},
  journal      = {CoRR},
  volume       = {abs/1507.08906},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.08906},
  eprinttype    = {arXiv},
  eprint       = {1507.08906},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishGKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenGSK15,
  author       = {Hsien{-}Pu Chen and
                  Elias Gonzalez and
                  Yessica Saez and
                  Laszlo B. Kish},
  title        = {Cable Capacitance Attack against the {KLJN} Secure Key Exchange},
  journal      = {CoRR},
  volume       = {abs/1508.02984},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.02984},
  eprinttype    = {arXiv},
  eprint       = {1508.02984},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenGSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishG15,
  author       = {Laszlo Bela Kish and
                  Claes{-}Goran Granqvist},
  title        = {Random-resistor-random-temperature {KLJN} key exchange},
  journal      = {CoRR},
  volume       = {abs/1509.08150},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.08150},
  eprinttype    = {arXiv},
  eprint       = {1509.08150},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhangKG15,
  author       = {Bruce Zhang and
                  Laszlo B. Kish and
                  Claes{-}Goran Granqvist},
  title        = {Drawing from hats by noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1511.03552},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.03552},
  eprinttype    = {arXiv},
  eprint       = {1511.03552},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhangKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GonzalezK15,
  author       = {Elias Gonzalez and
                  Laszlo B. Kish},
  title        = {Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
                  Unconditionally Secure Key Exchange},
  journal      = {CoRR},
  volume       = {abs/1511.06795},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.06795},
  eprinttype    = {arXiv},
  eprint       = {1511.06795},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GonzalezK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenMK15,
  author       = {Hsien{-}Pu Chen and
                  Muneer Mohammad and
                  Laszlo B. Kish},
  title        = {Current Injection Attack against the {KLJN} Secure Key Exchange},
  journal      = {CoRR},
  volume       = {abs/1512.03685},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.03685},
  eprinttype    = {arXiv},
  eprint       = {1512.03685},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/KishG14,
  author       = {Laszlo B. Kish and
                  Claes{-}G{\"{o}}ran Granqvist},
  title        = {Elimination of a Second-Law-Attack, and All Cable-Resistance-Based
                  Attacks, in the Kirchhoff-Law-Johnson-Noise {(KLJN)} Secure Key Exchange
                  System},
  journal      = {Entropy},
  volume       = {16},
  number       = {10},
  pages        = {5223--5231},
  year         = {2014},
  url          = {https://doi.org/10.3390/e16105223},
  doi          = {10.3390/E16105223},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/KishG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/KishG14,
  author       = {Laszlo B. Kish and
                  Claes{-}G{\"{o}}ran Granqvist},
  title        = {On the security of the Kirchhoff-law-Johnson-noise {(KLJN)} communicator},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {10},
  pages        = {2213--2219},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0729-7},
  doi          = {10.1007/S11128-014-0729-7},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/KishG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SaezCKP14,
  author       = {Yessica Saez and
                  Xiaolin Cao and
                  Laszlo B. Kish and
                  G. Pesti},
  title        = {Securing vehicle communication systems by the {KLJN} key exchange
                  protocol},
  journal      = {CoRR},
  volume       = {abs/1404.1900},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1900},
  eprinttype    = {arXiv},
  eprint       = {1404.1900},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SaezCKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenKGS14,
  author       = {Hsien{-}Pu Chen and
                  Laszlo B. Kish and
                  Claes{-}Goran Granqvist and
                  Gabor Schmera},
  title        = {Do electromagnetic waves exist in a short cable at low frequencies?
                  What does physics say?},
  journal      = {CoRR},
  volume       = {abs/1404.4664},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.4664},
  eprinttype    = {arXiv},
  eprint       = {1404.4664},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenKGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChenKGS14a,
  author       = {Hsien{-}Pu Chen and
                  Laszlo B. Kish and
                  Claes{-}Goran Granqvist and
                  Gabor Schmera},
  title        = {On the "cracking" scheme in the paper "A directional
                  coupler attack against the Kish key distribution system" by Gunn,
                  Allison and Abbott},
  journal      = {CoRR},
  volume       = {abs/1405.2034},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.2034},
  eprinttype    = {arXiv},
  eprint       = {1405.2034},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChenKGS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishG14,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist},
  title        = {Elimination of a Second-Law-attack, and all cable-resistance-based
                  attacks, in the Kirchhoff-law-Johnson-noise {(KLJN)} secure key exchange
                  system},
  journal      = {CoRR},
  volume       = {abs/1406.5179},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.5179},
  eprinttype    = {arXiv},
  eprint       = {1406.5179},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishAGW14,
  author       = {Laszlo B. Kish and
                  Derek Abbott and
                  Claes{-}Goran Granqvist and
                  He Wen},
  title        = {Facts, myths and fights about the {KLJN} classical physical key exchanger},
  journal      = {CoRR},
  volume       = {abs/1408.4069},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.4069},
  eprinttype    = {arXiv},
  eprint       = {1408.4069},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishAGW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishGHKWB14,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist and
                  Tam{\'{a}}s Horv{\'{a}}th and
                  Andreas Klappenecker and
                  He Wen and
                  Sergey M. Bezrukov},
  title        = {Bird's-eye view on Noise-Based Logic},
  journal      = {CoRR},
  volume       = {abs/1408.4076},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.4076},
  eprinttype    = {arXiv},
  eprint       = {1408.4076},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KishGHKWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishGBH14,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist and
                  Sergey M. Bezrukov and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Brain: Biological noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1408.4077},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.4077},
  eprinttype    = {arXiv},
  eprint       = {1408.4077},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KishGBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kish14,
  author       = {Laszlo B. Kish},
  title        = {Enhanced usage of keys obtained by physical, unconditionally secure
                  distributions},
  journal      = {CoRR},
  volume       = {abs/1408.5800},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.5800},
  eprinttype    = {arXiv},
  eprint       = {1408.5800},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kish14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaoSPK14,
  author       = {Xiaolin Cao and
                  Yessica Saez and
                  G. Pesti and
                  Laszlo B. Kish},
  title        = {On KLJN-based secure key distribution in vehicular communication networks},
  journal      = {CoRR},
  volume       = {abs/1409.5911},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.5911},
  eprinttype    = {arXiv},
  eprint       = {1409.5911},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaoSPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishGMVSG14,
  author       = {Laszlo B. Kish and
                  Zoltan Gingl and
                  Robert Mingesz and
                  Gergely Vadai and
                  Janusz M. Smulko and
                  Claes{-}Goran Granqvist},
  title        = {Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott
                  against the Kirchhoff-law-Johnson-noise {(KLJN)} secure key exchange
                  system},
  journal      = {CoRR},
  volume       = {abs/1411.0818},
  year         = {2014},
  url          = {http://arxiv.org/abs/1411.0818},
  eprinttype    = {arXiv},
  eprint       = {1411.0818},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KishGMVSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/KishG13,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist},
  title        = {Does information have mass? [Point of View]},
  journal      = {Proc. {IEEE}},
  volume       = {101},
  number       = {9},
  pages        = {1895--1899},
  year         = {2013},
  url          = {https://doi.org/10.1109/JPROC.2013.2273720},
  doi          = {10.1109/JPROC.2013.2273720},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/KishG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-3901,
  author       = {Laszlo B. Kish},
  title        = {Enhanced secure key exchange systems based on the Johnson-noise scheme},
  journal      = {CoRR},
  volume       = {abs/1302.3901},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.3901},
  eprinttype    = {arXiv},
  eprint       = {1302.3901},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-3901.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-3262,
  author       = {Elias Gonzalez and
                  Laszlo B. Kish and
                  Robert S. Balog and
                  Prasad Enjeti},
  title        = {Information theoretically secure, enhanced Johnson noise based key
                  distribution over the smart grid with switched filters},
  journal      = {CoRR},
  volume       = {abs/1303.3262},
  year         = {2013},
  url          = {http://arxiv.org/abs/1303.3262},
  eprinttype    = {arXiv},
  eprint       = {1303.3262},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1303-3262.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-3248,
  author       = {Laszlo B. Kish and
                  Chiman Kwan},
  title        = {Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise
                  secure key exchange and noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1305.3248},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.3248},
  eprinttype    = {arXiv},
  eprint       = {1305.3248},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-3248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-4787,
  author       = {Yessica Saez and
                  Laszlo B. Kish},
  title        = {Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure
                  key exchange},
  journal      = {CoRR},
  volume       = {abs/1305.4787},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.4787},
  eprinttype    = {arXiv},
  eprint       = {1305.4787},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-4787.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishAG13,
  author       = {Laszlo B. Kish and
                  Derek Abbott and
                  Claes{-}Goran Granqvist},
  title        = {Critical analysis of the Bennett-Riedel attack on secure cryptographic
                  key distributions via the Kirchhoff-law-Johnson-noise scheme},
  journal      = {CoRR},
  volume       = {abs/1306.6531},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.6531},
  eprinttype    = {arXiv},
  eprint       = {1306.6531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SaezKMGG13,
  author       = {Yessica Saez and
                  Laszlo B. Kish and
                  Robert Mingesz and
                  Zoltan Gingl and
                  Claes{-}Goran Granqvist},
  title        = {Current and voltage based bit errors and their combined mitigation
                  for the Kirchhoff-law-Johnson-noise secure key exchange},
  journal      = {CoRR},
  volume       = {abs/1309.2179},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.2179},
  eprinttype    = {arXiv},
  eprint       = {1309.2179},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SaezKMGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishG13,
  author       = {Laszlo B. Kish and
                  Claes{-}Goran Granqvist},
  title        = {On the security of the Kirchhoff-law-Johnson-noise {(KLJN)} communicator},
  journal      = {CoRR},
  volume       = {abs/1309.4112},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.4112},
  eprinttype    = {arXiv},
  eprint       = {1309.4112},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KishG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kish13,
  author       = {Laszlo B. Kish},
  title        = {Times in noise-based logic: increased dimensions of logic hyperspace},
  journal      = {CoRR},
  volume       = {abs/1312.0309},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.0309},
  eprinttype    = {arXiv},
  eprint       = {1312.0309},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kish13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KishP12,
  author       = {Laszlo B. Kish and
                  Ferdinand Peper},
  title        = {Information Networks Secured by the Laws of Physics},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {5},
  pages        = {1501--1507},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.1501},
  doi          = {10.1587/TRANSCOM.E95.B.1501},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KishP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/WenK12,
  author       = {He Wen and
                  Laszlo B. Kish},
  editor       = {Alan J. Hu},
  title        = {Noise based logic: Why noise?},
  booktitle    = {2012 {IEEE/ACM} International Conference on Computer-Aided Design,
                  {ICCAD} 2012, San Jose, CA, USA, November 5-8, 2012},
  pages        = {152--155},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2429384.2429413},
  doi          = {10.1145/2429384.2429413},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/WenK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofa/MingeszKGGWPES12,
  author       = {Robert Mingesz and
                  Laszlo B. Kish and
                  Zoltan Gingl and
                  Claes{-}Goran Granqvist and
                  He Wen and
                  Ferdinand Peper and
                  T. Eubanks and
                  Gabor Schmera},
  editor       = {Valentina Emilia Balas and
                  J{\'{a}}nos C. Fodor and
                  Annam{\'{a}}ria R. V{\'{a}}rkonyi{-}K{\'{o}}czy and
                  J{\'{o}}zsef Dombi and
                  Lakhmi C. Jain},
  title        = {Information Theoretic Security by the Laws of Classical Physics -
                  (Plenary Paper)},
  booktitle    = {Soft Computing Applications - Proceedings of the 5th International
                  Workshop Soft Computing Applications, {SOFA} 2012, Szeged, Hungary,
                  22-14 August 2012},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {195},
  pages        = {11--25},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33941-7\_5},
  doi          = {10.1007/978-3-642-33941-7\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofa/MingeszKGGWPES12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-2545,
  author       = {Laszlo B. Kish and
                  He Wen},
  title        = {Noise based logic: why noise? {A} comparative study of the necessity
                  of randomness out of orthogonality},
  journal      = {CoRR},
  volume       = {abs/1204.2545},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.2545},
  eprinttype    = {arXiv},
  eprint       = {1204.2545},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-2545.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-3318,
  author       = {He Wen and
                  Laszlo B. Kish and
                  Gabor Schmera},
  title        = {High-dimensional noise-based logical controller},
  journal      = {CoRR},
  volume       = {abs/1204.3318},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.3318},
  eprinttype    = {arXiv},
  eprint       = {1204.3318},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-3318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-2534,
  author       = {Robert Mingesz and
                  Laszlo B. Kish and
                  Zoltan Gingl and
                  Claes{-}Goran Granqvist and
                  He Wen and
                  Ferdinand Peper and
                  T. Eubanks and
                  Gabor Schmera},
  title        = {Information theoretic security by the laws of classical physics},
  journal      = {CoRR},
  volume       = {abs/1206.2534},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.2534},
  eprinttype    = {arXiv},
  eprint       = {1206.2534},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-2534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijuc/KishKBPGH11,
  author       = {Laszlo B. Kish and
                  Sunil P. Khatri and
                  Sergey M. Bezrukov and
                  Ferdinand Peper and
                  Zoltan Gingl and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Noise-based Deterministic Logic and Computing: a Brief Survey},
  journal      = {Int. J. Unconv. Comput.},
  volume       = {7},
  number       = {1-2},
  pages        = {101--113},
  year         = {2011},
  url          = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-7-number-1-2-2011/ijuc-7-1-2-p-101-113/},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijuc/KishKBPGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-4264,
  author       = {Tam{\'{a}}s Horv{\'{a}}th and
                  Laszlo B. Kish and
                  Jacob Scheuer},
  title        = {Effective Privacy Amplification for Secure Classical Communications},
  journal      = {CoRR},
  volume       = {abs/1101.4264},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.4264},
  eprinttype    = {arXiv},
  eprint       = {1101.4264},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-4264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-2256,
  author       = {Laszlo B. Kish and
                  Sunil P. Khatri and
                  Sergey M. Bezrukov and
                  Ferdinand Peper and
                  Zoltan Gingl and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Noise-based information processing: Noise-based logic and computing:
                  what do we have so far?},
  journal      = {CoRR},
  volume       = {abs/1102.2256},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.2256},
  eprinttype    = {arXiv},
  eprint       = {1102.2256},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-2256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-4367,
  author       = {Laszlo B. Kish and
                  Ferdinand Peper},
  title        = {Information Networks Secured by the Laws of Physics},
  journal      = {CoRR},
  volume       = {abs/1110.4367},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.4367},
  eprinttype    = {arXiv},
  eprint       = {1110.4367},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-4367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-3859,
  author       = {He Wen and
                  Laszlo B. Kish and
                  Andreas Klappenecker and
                  Ferdinand Peper},
  title        = {New noise-based logic representations to avoid some problems with
                  time complexity},
  journal      = {CoRR},
  volume       = {abs/1111.3859},
  year         = {2011},
  url          = {http://arxiv.org/abs/1111.3859},
  eprinttype    = {arXiv},
  eprint       = {1111.3859},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-3859.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ChangKKK10,
  author       = {Hung{-}Chih Chang and
                  Laszlo B. Kish and
                  Maria D. King and
                  Chiman Kwan},
  title        = {Binary Fingerprints at Fluctuation-Enhanced Sensing},
  journal      = {Sensors},
  volume       = {10},
  number       = {1},
  pages        = {361--373},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100100361},
  doi          = {10.3390/S100100361},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ChangKKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BollapalliKK10,
  author       = {Kalyana C. Bollapalli and
                  Sunil P. Khatri and
                  Laszlo B. Kish},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Implementing digital logic with sinusoidal supplies},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {315--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5457188},
  doi          = {10.1109/DATE.2010.5457188},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BollapalliKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-3932,
  author       = {Zoltan Gingl and
                  Sunil P. Khatri and
                  Laszlo B. Kish},
  title        = {Towards brain-inspired computing},
  journal      = {CoRR},
  volume       = {abs/1003.3932},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.3932},
  eprinttype    = {arXiv},
  eprint       = {1003.3932},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-3932.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-2652,
  author       = {Laszlo B. Kish and
                  Sunil P. Khatri and
                  Ferdinand Peper},
  title        = {Instantaneous noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1004.2652},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.2652},
  eprinttype    = {arXiv},
  eprint       = {1004.2652},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-2652.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-1560,
  author       = {Laszlo B. Kish and
                  Sunil P. Khatri and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Computation using Noise-based Logic: Efficient String Verification
                  over a Slow Communication Channel},
  journal      = {CoRR},
  volume       = {abs/1005.1560},
  year         = {2010},
  url          = {http://arxiv.org/abs/1005.1560},
  eprinttype    = {arXiv},
  eprint       = {1005.1560},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1005-1560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-5282,
  author       = {Laszlo B. Kish and
                  Sunil P. Khatri and
                  Sergey M. Bezrukov and
                  Ferdinand Peper and
                  Zoltan Gingl and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Noise-based deterministic logic and computing: a brief survey},
  journal      = {CoRR},
  volume       = {abs/1007.5282},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.5282},
  eprinttype    = {arXiv},
  eprint       = {1007.5282},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-5282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-3531,
  author       = {Ferdinand Peper and
                  Laszlo B. Kish},
  title        = {Instantaneous, non-squeezed, noise-based logic},
  journal      = {CoRR},
  volume       = {abs/1012.3531},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.3531},
  eprinttype    = {arXiv},
  eprint       = {1012.3531},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-3531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwnc/KishBKGS09,
  author       = {Laszlo B. Kish and
                  Sergey M. Bezrukov and
                  Sunil P. Khatri and
                  Zoltan Gingl and
                  S. Sethuraman},
  editor       = {Ferdinand Peper and
                  Hiroshi Umeo and
                  Nobuyuki Matsui and
                  Teijiro Isokawa},
  title        = {Noise-Based Logic and Computing: From Boolean Logic Gates to Brain
                  Circuitry and Its Possible Hardware Realization},
  booktitle    = {Natural Computing - 4th International Workshop on Natural Computing,
                  {IWNC} 2009, Himeji, Japan, September 2009, Proceedings},
  series       = {Proceedings in Information and Communications Technology},
  volume       = {2},
  pages        = {13--22},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-4-431-53868-4\_2},
  doi          = {10.1007/978-4-431-53868-4\_2},
  timestamp    = {Wed, 12 Sep 2018 18:41:31 +0200},
  biburl       = {https://dblp.org/rec/conf/iwnc/KishBKGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KishH09,
  author       = {Laszlo B. Kish and
                  Tam{\'{a}}s Horv{\'{a}}th},
  title        = {Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based
                  Secure Key Exchange},
  journal      = {CoRR},
  volume       = {abs/0903.2071},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.2071},
  eprinttype    = {arXiv},
  eprint       = {0903.2071},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/KishH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-0665,
  author       = {Lazar L. Kish and
                  Bruce Zhang and
                  Laszlo B. Kish},
  title        = {Cracking the Liu key exchange protocol in its most secure state with
                  Lorentzian spectra},
  journal      = {CoRR},
  volume       = {abs/0910.0665},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.0665},
  eprinttype    = {arXiv},
  eprint       = {0910.0665},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-0665.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-3503,
  author       = {Laszlo B. Kish},
  title        = {Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's
                  Laws},
  journal      = {CoRR},
  volume       = {abs/0912.3503},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.3503},
  eprinttype    = {arXiv},
  eprint       = {0912.3503},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-3503.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-4479,
  author       = {Laszlo B. Kish},
  title        = {Unconditionally secure computers and hardware, such as memories, processors,
                  and hard drives},
  journal      = {CoRR},
  volume       = {abs/0803.4479},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.4479},
  eprinttype    = {arXiv},
  eprint       = {0803.4479},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-4479.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Gea-BanaclocheK05,
  author       = {Julio Gea{-}Banacloche and
                  Laszlo B. Kish},
  title        = {Future Directions in Electronic Computing and Information Processing},
  journal      = {Proc. {IEEE}},
  volume       = {93},
  number       = {10},
  pages        = {1858--1863},
  year         = {2005},
  url          = {https://doi.org/10.1109/JPROC.2005.853549},
  doi          = {10.1109/JPROC.2005.853549},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Gea-BanaclocheK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/AbbottDCLBHFGBK03,
  author       = {Derek Abbott and
                  Charles R. Doering and
                  Carlton M. Caves and
                  Daniel M. Lidar and
                  Howard E. Brandt and
                  Alex R. Hamilton and
                  David K. Ferry and
                  Julio Gea{-}Banacloche and
                  Sergey M. Bezrukov and
                  Laszlo B. Kish},
  title        = {Dreams Versus Reality: Plenary Debate Session on Quantum Computing},
  journal      = {Quantum Inf. Process.},
  volume       = {2},
  number       = {6},
  pages        = {449--472},
  year         = {2003},
  url          = {https://doi.org/10.1023/B\%3AQINP.0000042203.24782.9a},
  doi          = {10.1023/B\%3AQINP.0000042203.24782.9A},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/AbbottDCLBHFGBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}