default search action
BibTeX records: Laszlo B. Kish
@article{DBLP:journals/corr/abs-2404-16849, author = {Kate Davis and Laszlo B. Kish and Chanan Singh}, title = {Smart Grids Secured By Dynamic Watermarking: How Secure?}, journal = {CoRR}, volume = {abs/2404.16849}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.16849}, doi = {10.48550/ARXIV.2404.16849}, eprinttype = {arXiv}, eprint = {2404.16849}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-16849.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-15494, author = {Mehmet Yildirim and Nasir Kenarangui and Robert S. Balog and Laszlo B. Kish and Chanan Singh}, title = {Simple Cracking of (Noise-Based) Dynamic Watermarking in Smart Grids}, journal = {CoRR}, volume = {abs/2406.15494}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.15494}, doi = {10.48550/ARXIV.2406.15494}, eprinttype = {arXiv}, eprint = {2406.15494}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-15494.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-05607, author = {Shahriar Ferdous and Laszlo B. Kish}, title = {Transient Attack against the {KLJN} Secure Key Exchanger}, journal = {CoRR}, volume = {abs/2302.05607}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.05607}, doi = {10.48550/ARXIV.2302.05607}, eprinttype = {arXiv}, eprint = {2302.05607}, timestamp = {Sun, 19 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-05607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-06449, author = {Mohammad B. Khreishah and Walter C. Daugherity and Laszlo B. Kish}, title = {{XOR} and {XNOR} gates in instantaneous noise based logic}, journal = {CoRR}, volume = {abs/2302.06449}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.06449}, doi = {10.48550/ARXIV.2302.06449}, eprinttype = {arXiv}, eprint = {2302.06449}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-06449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-00984, author = {Laszlo B. Kish}, title = {Ternary Instantaneous Noise-based Logic}, journal = {CoRR}, volume = {abs/2305.00984}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.00984}, doi = {10.48550/ARXIV.2305.00984}, eprinttype = {arXiv}, eprint = {2305.00984}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-00984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04899, author = {Shahriar Ferdous and Laszlo B. Kish}, title = {Transient Attacks against the {VMG-KLJN} Secure Key Exchanger}, journal = {CoRR}, volume = {abs/2309.04899}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04899}, doi = {10.48550/ARXIV.2309.04899}, eprinttype = {arXiv}, eprint = {2309.04899}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04899.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00031, author = {Laszlo B. Kish}, title = {Crypto analysis of the key distribution scheme using noise-free resistances}, journal = {CoRR}, volume = {abs/2312.00031}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00031}, doi = {10.48550/ARXIV.2312.00031}, eprinttype = {arXiv}, eprint = {2312.00031}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-05675, author = {Laszlo B. Kish}, title = {Time synchronization protocol for the {KLJN} secure key exchange scheme}, journal = {CoRR}, volume = {abs/2207.05675}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.05675}, doi = {10.48550/ARXIV.2207.05675}, eprinttype = {arXiv}, eprint = {2207.05675}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-05675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-05121, author = {Shahriar Ferdous and Christiana Chamon and Laszlo B. Kish}, title = {Current injection and voltage insertion attacks against the {VMG-KLJN} secure key exchanger}, journal = {CoRR}, volume = {abs/2210.05121}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.05121}, doi = {10.48550/ARXIV.2210.05121}, eprinttype = {arXiv}, eprint = {2210.05121}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-05121.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-12592, author = {Christiana Chamon and Laszlo B. Kish}, title = {Perspective - On the thermodynamics of perfect unconditional security}, journal = {CoRR}, volume = {abs/2105.12592}, year = {2021}, url = {https://arxiv.org/abs/2105.12592}, eprinttype = {arXiv}, eprint = {2105.12592}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-12592.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-09370, author = {Christiana Chamon and Laszlo B. Kish}, title = {Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise {(KLJN)} Secure Key Exchange Protocol}, journal = {CoRR}, volume = {abs/2108.09370}, year = {2021}, url = {https://arxiv.org/abs/2108.09370}, eprinttype = {arXiv}, eprint = {2108.09370}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-09370.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-01137, author = {Jiaao Song and Laszlo B. Kish}, title = {From cold resistor to secure key exchanger}, journal = {CoRR}, volume = {abs/2110.01137}, year = {2021}, url = {https://arxiv.org/abs/2110.01137}, eprinttype = {arXiv}, eprint = {2110.01137}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-01137.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-03088, author = {Christiana Chamon and Shahriar Ferdous and Laszlo B. Kish}, title = {Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise {(KLJN)} Secure Key Exchange Protocol}, journal = {CoRR}, volume = {abs/2110.03088}, year = {2021}, url = {https://arxiv.org/abs/2110.03088}, eprinttype = {arXiv}, eprint = {2110.03088}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-03088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/ScandurraSK20, author = {Graziella Scandurra and Janusz M. Smulko and Laszlo B. Kish}, title = {Fluctuation-Enhanced Sensing}, journal = {J. Sensors}, volume = {2020}, pages = {6108347:1--6108347:2}, year = {2020}, url = {https://doi.org/10.1155/2020/6108347}, doi = {10.1155/2020/6108347}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/ScandurraSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-03369, author = {Mutaz Y. Melhem and Laszlo B. Kish}, title = {Man in the middle and current injection attacks against the {KLJN} key exchanger compromised by {DC} sources}, journal = {CoRR}, volume = {abs/2004.03369}, year = {2020}, url = {https://arxiv.org/abs/2004.03369}, eprinttype = {arXiv}, eprint = {2004.03369}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-03369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-10429, author = {Christiana Chamon and Shahriar Ferdous and Laszlo B. Kish}, title = {Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol}, journal = {CoRR}, volume = {abs/2005.10429}, year = {2020}, url = {https://arxiv.org/abs/2005.10429}, eprinttype = {arXiv}, eprint = {2005.10429}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-10429.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11002, author = {Mutaz Y. Melhem and Christiana Chamon and Shahriar Ferdous and Laszlo B. Kish}, title = {{AC} Loop Current Attacks Against The {KLJN} Secure Key Exchange Scheme}, journal = {CoRR}, volume = {abs/2005.11002}, year = {2020}, url = {https://arxiv.org/abs/2005.11002}, eprinttype = {arXiv}, eprint = {2005.11002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-04280, author = {Shahriar Ferdous and Christiana Chamon and Laszlo B. Kish}, title = {Comments on the "Generalized" {KLJN} Key Exchanger with Arbitrary Resistors: Power, Impedance, Security}, journal = {CoRR}, volume = {abs/2010.04280}, year = {2020}, url = {https://arxiv.org/abs/2010.04280}, eprinttype = {arXiv}, eprint = {2010.04280}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-04280.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02848, author = {Christiana Chamon and Shahriar Ferdous and Laszlo B. Kish}, title = {Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol}, journal = {CoRR}, volume = {abs/2012.02848}, year = {2020}, url = {https://arxiv.org/abs/2012.02848}, eprinttype = {arXiv}, eprint = {2012.02848}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02848.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-03162, author = {Laszlo B. Kish and Walter Daugherity}, title = {Entanglement, and unsorted database search in noise-based logic}, journal = {CoRR}, volume = {abs/1905.03162}, year = {2019}, url = {http://arxiv.org/abs/1905.03162}, eprinttype = {arXiv}, eprint = {1905.03162}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-03162.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00974, author = {Mutaz Y. Melhem and Laszlo B. Kish}, title = {Generalized {DC} loop current attack against the {KLJN} secure key exchange scheme}, journal = {CoRR}, volume = {abs/1910.00974}, year = {2019}, url = {http://arxiv.org/abs/1910.00974}, eprinttype = {arXiv}, eprint = {1910.00974}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/KwanK18, author = {Chiman Kwan and Laszlo B. Kish}, title = {Unconditionally Secure Control and Diagnostic Systems}, booktitle = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018}, pages = {5686--5691}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IECON.2018.8591266}, doi = {10.1109/IECON.2018.8591266}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/KwanK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/KwanKSC18, author = {Chiman Kwan and Laszlo B. Kish and Yessica Saez and Xiaolin Cao}, title = {Low Cost and Unconditionally Secure Communications for Complex {UAS} Networks}, booktitle = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018}, pages = {5895--5900}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IECON.2018.8591080}, doi = {10.1109/IECON.2018.8591080}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/KwanKSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09671, author = {Laszlo B. Kish and Walter Daugherity}, title = {Noise-based logic gates by operations on the reference system}, journal = {CoRR}, volume = {abs/1803.09671}, year = {2018}, url = {http://arxiv.org/abs/1803.09671}, eprinttype = {arXiv}, eprint = {1803.09671}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09671.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-05596, author = {Mutaz Y. Melhem and Laszlo B. Kish}, title = {A Static-Loop-Current Attack against the {KLJN} Secure Key Exchange System}, journal = {CoRR}, volume = {abs/1806.05596}, year = {2018}, url = {http://arxiv.org/abs/1806.05596}, eprinttype = {arXiv}, eprint = {1806.05596}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-05596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ws/Kish17, author = {Laszlo B. Kish}, title = {The Kish Cypher - The Story of {KLJN} for Unconditional Security}, publisher = {WorldScientific}, year = {2017}, url = {https://doi.org/10.1142/8707}, doi = {10.1142/8707}, isbn = {9789814449458}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ws/Kish17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/GrigorievKS17, author = {Dima Grigoriev and Laszlo B. Kish and Vladimir Shpilrain}, title = {Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions}, journal = {Int. J. Found. Comput. Sci.}, volume = {28}, number = {4}, pages = {379--390}, year = {2017}, url = {https://doi.org/10.1142/S012905411750023X}, doi = {10.1142/S012905411750023X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/GrigorievKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/ZhangKG17, author = {Bruce Zhang and Laszlo Bela Kish and Claes{-}G{\"{o}}ran Granqvist}, title = {Drawing from hats by noise-based logic}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {32}, number = {3}, pages = {244--251}, year = {2017}, url = {https://doi.org/10.1080/17445760.2016.1140168}, doi = {10.1080/17445760.2016.1140168}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/ZhangKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SundqvistK17, author = {Kyle Sundqvist and Laszlo B. Kish}, title = {Is the memristor always a passive device?}, journal = {CoRR}, volume = {abs/1703.09064}, year = {2017}, url = {http://arxiv.org/abs/1703.09064}, eprinttype = {arXiv}, eprint = {1703.09064}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SundqvistK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijuc/LeePCNOKTSKK16, author = {Jia Lee and Ferdinand Peper and Sorin Dan Cotofana and Makoto Naruse and Motoichi Ohtsu and Tadashi Kawazoe and Yasuo Takahashi and Tetsuya Shimokawa and Laszlo B. Kish and Tohru Kubota}, title = {Brownian Circuits: Designs}, journal = {Int. J. Unconv. Comput.}, volume = {12}, number = {5-6}, pages = {341--362}, year = {2016}, url = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-12-number-5-6-2016/ijuc-12-5-6-p-341-362/}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijuc/LeePCNOKTSKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishGKP16, author = {Laszlo B. Kish and Claes{-}Goran Granqvist and Sunil P. Khatri and Ferdinand Peper}, title = {Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"}, journal = {CoRR}, volume = {abs/1602.02638}, year = {2016}, url = {http://arxiv.org/abs/1602.02638}, eprinttype = {arXiv}, eprint = {1602.02638}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishGKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishEGK16, author = {Laszlo Bela Kish and Kamran Entesari and Claes{-}Goran Granqvist and Chiman Kwan}, title = {Unconditionally secure credit/debit card chip scheme and physical unclonable function}, journal = {CoRR}, volume = {abs/1605.02355}, year = {2016}, url = {http://arxiv.org/abs/1605.02355}, eprinttype = {arXiv}, eprint = {1605.02355}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishEGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishG16, author = {Laszlo Bela Kish and Claes{-}Goran Granqvist}, title = {Comments On "A New Transient Attack On The Kish Key Distribution System"}, journal = {CoRR}, volume = {abs/1606.02697}, year = {2016}, url = {http://arxiv.org/abs/1606.02697}, eprinttype = {arXiv}, eprint = {1606.02697}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kish16, author = {Laszlo B. Kish}, title = {Comments on "sub-KBT micro-electromechanical irreversible logic gate"}, journal = {CoRR}, volume = {abs/1606.09493}, year = {2016}, url = {http://arxiv.org/abs/1606.09493}, eprinttype = {arXiv}, eprint = {1606.09493}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kish16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/GonzalezBK15, author = {Elias Gonzalez and Robert S. Balog and Laszlo B. Kish}, title = {Resource Requirements and Speed \emph{versus }Geometry of Unconditionally Secure Physical Key Exchanges}, journal = {Entropy}, volume = {17}, number = {4}, pages = {2010--2024}, year = {2015}, url = {https://doi.org/10.3390/e17042010}, doi = {10.3390/E17042010}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/GonzalezBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/ChenGSK15, author = {Hsien{-}Pu Chen and Elias Gonzalez and Yessica Saez and Laszlo B. Kish}, title = {Cable Capacitance Attack against the {KLJN} Secure Key Exchange}, journal = {Inf.}, volume = {6}, number = {4}, pages = {719--732}, year = {2015}, url = {https://doi.org/10.3390/info6040719}, doi = {10.3390/INFO6040719}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/ChenGSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GonzalezBK15, author = {Elias Gonzalez and Robert S. Balog and Laszlo B. Kish}, title = {Resource requirements and speed versus geometry of unconditionally secure physical key exchanges}, journal = {CoRR}, volume = {abs/1504.06541}, year = {2015}, url = {http://arxiv.org/abs/1504.06541}, eprinttype = {arXiv}, eprint = {1504.06541}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GonzalezBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishGKP15, author = {Laszlo B. Kish and Claes{-}G{\"{o}}ran Granqvist and Sunil P. Khatri and Ferdinand Peper}, title = {Zero and negative energy dissipation at information-theoretic erasure}, journal = {CoRR}, volume = {abs/1507.08906}, year = {2015}, url = {http://arxiv.org/abs/1507.08906}, eprinttype = {arXiv}, eprint = {1507.08906}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishGKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenGSK15, author = {Hsien{-}Pu Chen and Elias Gonzalez and Yessica Saez and Laszlo B. Kish}, title = {Cable Capacitance Attack against the {KLJN} Secure Key Exchange}, journal = {CoRR}, volume = {abs/1508.02984}, year = {2015}, url = {http://arxiv.org/abs/1508.02984}, eprinttype = {arXiv}, eprint = {1508.02984}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenGSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishG15, author = {Laszlo Bela Kish and Claes{-}Goran Granqvist}, title = {Random-resistor-random-temperature {KLJN} key exchange}, journal = {CoRR}, volume = {abs/1509.08150}, year = {2015}, url = {http://arxiv.org/abs/1509.08150}, eprinttype = {arXiv}, eprint = {1509.08150}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhangKG15, author = {Bruce Zhang and Laszlo B. Kish and Claes{-}Goran Granqvist}, title = {Drawing from hats by noise-based logic}, journal = {CoRR}, volume = {abs/1511.03552}, year = {2015}, url = {http://arxiv.org/abs/1511.03552}, eprinttype = {arXiv}, eprint = {1511.03552}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhangKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GonzalezK15, author = {Elias Gonzalez and Laszlo B. Kish}, title = {Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange}, journal = {CoRR}, volume = {abs/1511.06795}, year = {2015}, url = {http://arxiv.org/abs/1511.06795}, eprinttype = {arXiv}, eprint = {1511.06795}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GonzalezK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenMK15, author = {Hsien{-}Pu Chen and Muneer Mohammad and Laszlo B. Kish}, title = {Current Injection Attack against the {KLJN} Secure Key Exchange}, journal = {CoRR}, volume = {abs/1512.03685}, year = {2015}, url = {http://arxiv.org/abs/1512.03685}, eprinttype = {arXiv}, eprint = {1512.03685}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/KishG14, author = {Laszlo B. Kish and Claes{-}G{\"{o}}ran Granqvist}, title = {Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise {(KLJN)} Secure Key Exchange System}, journal = {Entropy}, volume = {16}, number = {10}, pages = {5223--5231}, year = {2014}, url = {https://doi.org/10.3390/e16105223}, doi = {10.3390/E16105223}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/KishG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/KishG14, author = {Laszlo B. Kish and Claes{-}G{\"{o}}ran Granqvist}, title = {On the security of the Kirchhoff-law-Johnson-noise {(KLJN)} communicator}, journal = {Quantum Inf. Process.}, volume = {13}, number = {10}, pages = {2213--2219}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0729-7}, doi = {10.1007/S11128-014-0729-7}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/KishG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SaezCKP14, author = {Yessica Saez and Xiaolin Cao and Laszlo B. Kish and G. Pesti}, title = {Securing vehicle communication systems by the {KLJN} key exchange protocol}, journal = {CoRR}, volume = {abs/1404.1900}, year = {2014}, url = {http://arxiv.org/abs/1404.1900}, eprinttype = {arXiv}, eprint = {1404.1900}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SaezCKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenKGS14, author = {Hsien{-}Pu Chen and Laszlo B. Kish and Claes{-}Goran Granqvist and Gabor Schmera}, title = {Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?}, journal = {CoRR}, volume = {abs/1404.4664}, year = {2014}, url = {http://arxiv.org/abs/1404.4664}, eprinttype = {arXiv}, eprint = {1404.4664}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenKGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChenKGS14a, author = {Hsien{-}Pu Chen and Laszlo B. Kish and Claes{-}Goran Granqvist and Gabor Schmera}, title = {On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott}, journal = {CoRR}, volume = {abs/1405.2034}, year = {2014}, url = {http://arxiv.org/abs/1405.2034}, eprinttype = {arXiv}, eprint = {1405.2034}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChenKGS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishG14, author = {Laszlo B. Kish and Claes{-}Goran Granqvist}, title = {Elimination of a Second-Law-attack, and all cable-resistance-based attacks, in the Kirchhoff-law-Johnson-noise {(KLJN)} secure key exchange system}, journal = {CoRR}, volume = {abs/1406.5179}, year = {2014}, url = {http://arxiv.org/abs/1406.5179}, eprinttype = {arXiv}, eprint = {1406.5179}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishAGW14, author = {Laszlo B. Kish and Derek Abbott and Claes{-}Goran Granqvist and He Wen}, title = {Facts, myths and fights about the {KLJN} classical physical key exchanger}, journal = {CoRR}, volume = {abs/1408.4069}, year = {2014}, url = {http://arxiv.org/abs/1408.4069}, eprinttype = {arXiv}, eprint = {1408.4069}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishAGW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishGHKWB14, author = {Laszlo B. Kish and Claes{-}Goran Granqvist and Tam{\'{a}}s Horv{\'{a}}th and Andreas Klappenecker and He Wen and Sergey M. Bezrukov}, title = {Bird's-eye view on Noise-Based Logic}, journal = {CoRR}, volume = {abs/1408.4076}, year = {2014}, url = {http://arxiv.org/abs/1408.4076}, eprinttype = {arXiv}, eprint = {1408.4076}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KishGHKWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishGBH14, author = {Laszlo B. Kish and Claes{-}Goran Granqvist and Sergey M. Bezrukov and Tam{\'{a}}s Horv{\'{a}}th}, title = {Brain: Biological noise-based logic}, journal = {CoRR}, volume = {abs/1408.4077}, year = {2014}, url = {http://arxiv.org/abs/1408.4077}, eprinttype = {arXiv}, eprint = {1408.4077}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KishGBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kish14, author = {Laszlo B. Kish}, title = {Enhanced usage of keys obtained by physical, unconditionally secure distributions}, journal = {CoRR}, volume = {abs/1408.5800}, year = {2014}, url = {http://arxiv.org/abs/1408.5800}, eprinttype = {arXiv}, eprint = {1408.5800}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kish14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaoSPK14, author = {Xiaolin Cao and Yessica Saez and G. Pesti and Laszlo B. Kish}, title = {On KLJN-based secure key distribution in vehicular communication networks}, journal = {CoRR}, volume = {abs/1409.5911}, year = {2014}, url = {http://arxiv.org/abs/1409.5911}, eprinttype = {arXiv}, eprint = {1409.5911}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaoSPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishGMVSG14, author = {Laszlo B. Kish and Zoltan Gingl and Robert Mingesz and Gergely Vadai and Janusz M. Smulko and Claes{-}Goran Granqvist}, title = {Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise {(KLJN)} secure key exchange system}, journal = {CoRR}, volume = {abs/1411.0818}, year = {2014}, url = {http://arxiv.org/abs/1411.0818}, eprinttype = {arXiv}, eprint = {1411.0818}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KishGMVSG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/KishG13, author = {Laszlo B. Kish and Claes{-}Goran Granqvist}, title = {Does information have mass? [Point of View]}, journal = {Proc. {IEEE}}, volume = {101}, number = {9}, pages = {1895--1899}, year = {2013}, url = {https://doi.org/10.1109/JPROC.2013.2273720}, doi = {10.1109/JPROC.2013.2273720}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/KishG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-3901, author = {Laszlo B. Kish}, title = {Enhanced secure key exchange systems based on the Johnson-noise scheme}, journal = {CoRR}, volume = {abs/1302.3901}, year = {2013}, url = {http://arxiv.org/abs/1302.3901}, eprinttype = {arXiv}, eprint = {1302.3901}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-3901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-3262, author = {Elias Gonzalez and Laszlo B. Kish and Robert S. Balog and Prasad Enjeti}, title = {Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters}, journal = {CoRR}, volume = {abs/1303.3262}, year = {2013}, url = {http://arxiv.org/abs/1303.3262}, eprinttype = {arXiv}, eprint = {1303.3262}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-3262.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-3248, author = {Laszlo B. Kish and Chiman Kwan}, title = {Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic}, journal = {CoRR}, volume = {abs/1305.3248}, year = {2013}, url = {http://arxiv.org/abs/1305.3248}, eprinttype = {arXiv}, eprint = {1305.3248}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-3248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-4787, author = {Yessica Saez and Laszlo B. Kish}, title = {Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange}, journal = {CoRR}, volume = {abs/1305.4787}, year = {2013}, url = {http://arxiv.org/abs/1305.4787}, eprinttype = {arXiv}, eprint = {1305.4787}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-4787.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishAG13, author = {Laszlo B. Kish and Derek Abbott and Claes{-}Goran Granqvist}, title = {Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme}, journal = {CoRR}, volume = {abs/1306.6531}, year = {2013}, url = {http://arxiv.org/abs/1306.6531}, eprinttype = {arXiv}, eprint = {1306.6531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SaezKMGG13, author = {Yessica Saez and Laszlo B. Kish and Robert Mingesz and Zoltan Gingl and Claes{-}Goran Granqvist}, title = {Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange}, journal = {CoRR}, volume = {abs/1309.2179}, year = {2013}, url = {http://arxiv.org/abs/1309.2179}, eprinttype = {arXiv}, eprint = {1309.2179}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SaezKMGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishG13, author = {Laszlo B. Kish and Claes{-}Goran Granqvist}, title = {On the security of the Kirchhoff-law-Johnson-noise {(KLJN)} communicator}, journal = {CoRR}, volume = {abs/1309.4112}, year = {2013}, url = {http://arxiv.org/abs/1309.4112}, eprinttype = {arXiv}, eprint = {1309.4112}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KishG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Kish13, author = {Laszlo B. Kish}, title = {Times in noise-based logic: increased dimensions of logic hyperspace}, journal = {CoRR}, volume = {abs/1312.0309}, year = {2013}, url = {http://arxiv.org/abs/1312.0309}, eprinttype = {arXiv}, eprint = {1312.0309}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Kish13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KishP12, author = {Laszlo B. Kish and Ferdinand Peper}, title = {Information Networks Secured by the Laws of Physics}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {5}, pages = {1501--1507}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.1501}, doi = {10.1587/TRANSCOM.E95.B.1501}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KishP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/WenK12, author = {He Wen and Laszlo B. Kish}, editor = {Alan J. Hu}, title = {Noise based logic: Why noise?}, booktitle = {2012 {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2012, San Jose, CA, USA, November 5-8, 2012}, pages = {152--155}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2429384.2429413}, doi = {10.1145/2429384.2429413}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/WenK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofa/MingeszKGGWPES12, author = {Robert Mingesz and Laszlo B. Kish and Zoltan Gingl and Claes{-}Goran Granqvist and He Wen and Ferdinand Peper and T. Eubanks and Gabor Schmera}, editor = {Valentina Emilia Balas and J{\'{a}}nos C. Fodor and Annam{\'{a}}ria R. V{\'{a}}rkonyi{-}K{\'{o}}czy and J{\'{o}}zsef Dombi and Lakhmi C. Jain}, title = {Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper)}, booktitle = {Soft Computing Applications - Proceedings of the 5th International Workshop Soft Computing Applications, {SOFA} 2012, Szeged, Hungary, 22-14 August 2012}, series = {Advances in Intelligent Systems and Computing}, volume = {195}, pages = {11--25}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33941-7\_5}, doi = {10.1007/978-3-642-33941-7\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofa/MingeszKGGWPES12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-2545, author = {Laszlo B. Kish and He Wen}, title = {Noise based logic: why noise? {A} comparative study of the necessity of randomness out of orthogonality}, journal = {CoRR}, volume = {abs/1204.2545}, year = {2012}, url = {http://arxiv.org/abs/1204.2545}, eprinttype = {arXiv}, eprint = {1204.2545}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-2545.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-3318, author = {He Wen and Laszlo B. Kish and Gabor Schmera}, title = {High-dimensional noise-based logical controller}, journal = {CoRR}, volume = {abs/1204.3318}, year = {2012}, url = {http://arxiv.org/abs/1204.3318}, eprinttype = {arXiv}, eprint = {1204.3318}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-3318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1206-2534, author = {Robert Mingesz and Laszlo B. Kish and Zoltan Gingl and Claes{-}Goran Granqvist and He Wen and Ferdinand Peper and T. Eubanks and Gabor Schmera}, title = {Information theoretic security by the laws of classical physics}, journal = {CoRR}, volume = {abs/1206.2534}, year = {2012}, url = {http://arxiv.org/abs/1206.2534}, eprinttype = {arXiv}, eprint = {1206.2534}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1206-2534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijuc/KishKBPGH11, author = {Laszlo B. Kish and Sunil P. Khatri and Sergey M. Bezrukov and Ferdinand Peper and Zoltan Gingl and Tam{\'{a}}s Horv{\'{a}}th}, title = {Noise-based Deterministic Logic and Computing: a Brief Survey}, journal = {Int. J. Unconv. Comput.}, volume = {7}, number = {1-2}, pages = {101--113}, year = {2011}, url = {http://www.oldcitypublishing.com/journals/ijuc-home/ijuc-issue-contents/ijuc-volume-7-number-1-2-2011/ijuc-7-1-2-p-101-113/}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijuc/KishKBPGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-4264, author = {Tam{\'{a}}s Horv{\'{a}}th and Laszlo B. Kish and Jacob Scheuer}, title = {Effective Privacy Amplification for Secure Classical Communications}, journal = {CoRR}, volume = {abs/1101.4264}, year = {2011}, url = {http://arxiv.org/abs/1101.4264}, eprinttype = {arXiv}, eprint = {1101.4264}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-4264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-2256, author = {Laszlo B. Kish and Sunil P. Khatri and Sergey M. Bezrukov and Ferdinand Peper and Zoltan Gingl and Tam{\'{a}}s Horv{\'{a}}th}, title = {Noise-based information processing: Noise-based logic and computing: what do we have so far?}, journal = {CoRR}, volume = {abs/1102.2256}, year = {2011}, url = {http://arxiv.org/abs/1102.2256}, eprinttype = {arXiv}, eprint = {1102.2256}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-2256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-4367, author = {Laszlo B. Kish and Ferdinand Peper}, title = {Information Networks Secured by the Laws of Physics}, journal = {CoRR}, volume = {abs/1110.4367}, year = {2011}, url = {http://arxiv.org/abs/1110.4367}, eprinttype = {arXiv}, eprint = {1110.4367}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-4367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-3859, author = {He Wen and Laszlo B. Kish and Andreas Klappenecker and Ferdinand Peper}, title = {New noise-based logic representations to avoid some problems with time complexity}, journal = {CoRR}, volume = {abs/1111.3859}, year = {2011}, url = {http://arxiv.org/abs/1111.3859}, eprinttype = {arXiv}, eprint = {1111.3859}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-3859.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChangKKK10, author = {Hung{-}Chih Chang and Laszlo B. Kish and Maria D. King and Chiman Kwan}, title = {Binary Fingerprints at Fluctuation-Enhanced Sensing}, journal = {Sensors}, volume = {10}, number = {1}, pages = {361--373}, year = {2010}, url = {https://doi.org/10.3390/s100100361}, doi = {10.3390/S100100361}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ChangKKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BollapalliKK10, author = {Kalyana C. Bollapalli and Sunil P. Khatri and Laszlo B. Kish}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Implementing digital logic with sinusoidal supplies}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {315--318}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5457188}, doi = {10.1109/DATE.2010.5457188}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/BollapalliKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-3932, author = {Zoltan Gingl and Sunil P. Khatri and Laszlo B. Kish}, title = {Towards brain-inspired computing}, journal = {CoRR}, volume = {abs/1003.3932}, year = {2010}, url = {http://arxiv.org/abs/1003.3932}, eprinttype = {arXiv}, eprint = {1003.3932}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-3932.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-2652, author = {Laszlo B. Kish and Sunil P. Khatri and Ferdinand Peper}, title = {Instantaneous noise-based logic}, journal = {CoRR}, volume = {abs/1004.2652}, year = {2010}, url = {http://arxiv.org/abs/1004.2652}, eprinttype = {arXiv}, eprint = {1004.2652}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-2652.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1005-1560, author = {Laszlo B. Kish and Sunil P. Khatri and Tam{\'{a}}s Horv{\'{a}}th}, title = {Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel}, journal = {CoRR}, volume = {abs/1005.1560}, year = {2010}, url = {http://arxiv.org/abs/1005.1560}, eprinttype = {arXiv}, eprint = {1005.1560}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1005-1560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-5282, author = {Laszlo B. Kish and Sunil P. Khatri and Sergey M. Bezrukov and Ferdinand Peper and Zoltan Gingl and Tam{\'{a}}s Horv{\'{a}}th}, title = {Noise-based deterministic logic and computing: a brief survey}, journal = {CoRR}, volume = {abs/1007.5282}, year = {2010}, url = {http://arxiv.org/abs/1007.5282}, eprinttype = {arXiv}, eprint = {1007.5282}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-5282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-3531, author = {Ferdinand Peper and Laszlo B. Kish}, title = {Instantaneous, non-squeezed, noise-based logic}, journal = {CoRR}, volume = {abs/1012.3531}, year = {2010}, url = {http://arxiv.org/abs/1012.3531}, eprinttype = {arXiv}, eprint = {1012.3531}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-3531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwnc/KishBKGS09, author = {Laszlo B. Kish and Sergey M. Bezrukov and Sunil P. Khatri and Zoltan Gingl and S. Sethuraman}, editor = {Ferdinand Peper and Hiroshi Umeo and Nobuyuki Matsui and Teijiro Isokawa}, title = {Noise-Based Logic and Computing: From Boolean Logic Gates to Brain Circuitry and Its Possible Hardware Realization}, booktitle = {Natural Computing - 4th International Workshop on Natural Computing, {IWNC} 2009, Himeji, Japan, September 2009, Proceedings}, series = {Proceedings in Information and Communications Technology}, volume = {2}, pages = {13--22}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-4-431-53868-4\_2}, doi = {10.1007/978-4-431-53868-4\_2}, timestamp = {Wed, 12 Sep 2018 18:41:31 +0200}, biburl = {https://dblp.org/rec/conf/iwnc/KishBKGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KishH09, author = {Laszlo B. Kish and Tam{\'{a}}s Horv{\'{a}}th}, title = {Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange}, journal = {CoRR}, volume = {abs/0903.2071}, year = {2009}, url = {http://arxiv.org/abs/0903.2071}, eprinttype = {arXiv}, eprint = {0903.2071}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/KishH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-0665, author = {Lazar L. Kish and Bruce Zhang and Laszlo B. Kish}, title = {Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra}, journal = {CoRR}, volume = {abs/0910.0665}, year = {2009}, url = {http://arxiv.org/abs/0910.0665}, eprinttype = {arXiv}, eprint = {0910.0665}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-0665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-3503, author = {Laszlo B. Kish}, title = {Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's Laws}, journal = {CoRR}, volume = {abs/0912.3503}, year = {2009}, url = {http://arxiv.org/abs/0912.3503}, eprinttype = {arXiv}, eprint = {0912.3503}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-3503.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-4479, author = {Laszlo B. Kish}, title = {Unconditionally secure computers and hardware, such as memories, processors, and hard drives}, journal = {CoRR}, volume = {abs/0803.4479}, year = {2008}, url = {http://arxiv.org/abs/0803.4479}, eprinttype = {arXiv}, eprint = {0803.4479}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-4479.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Gea-BanaclocheK05, author = {Julio Gea{-}Banacloche and Laszlo B. Kish}, title = {Future Directions in Electronic Computing and Information Processing}, journal = {Proc. {IEEE}}, volume = {93}, number = {10}, pages = {1858--1863}, year = {2005}, url = {https://doi.org/10.1109/JPROC.2005.853549}, doi = {10.1109/JPROC.2005.853549}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Gea-BanaclocheK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/AbbottDCLBHFGBK03, author = {Derek Abbott and Charles R. Doering and Carlton M. Caves and Daniel M. Lidar and Howard E. Brandt and Alex R. Hamilton and David K. Ferry and Julio Gea{-}Banacloche and Sergey M. Bezrukov and Laszlo B. Kish}, title = {Dreams Versus Reality: Plenary Debate Session on Quantum Computing}, journal = {Quantum Inf. Process.}, volume = {2}, number = {6}, pages = {449--472}, year = {2003}, url = {https://doi.org/10.1023/B\%3AQINP.0000042203.24782.9a}, doi = {10.1023/B\%3AQINP.0000042203.24782.9A}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/AbbottDCLBHFGBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.