Laszlo B. Kish
Orcid: 0000-0002-8917-954XAffiliations:
- Texas A&M University, College Station, TX, USA
According to our database1,
Laszlo B. Kish
authored at least 83 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
2023
CoRR, 2023
2022
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger.
CoRR, 2022
2021
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol.
CoRR, 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol.
CoRR, 2021
2020
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol.
CoRR, 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security.
CoRR, 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol.
CoRR, 2020
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources.
CoRR, 2020
2019
CoRR, 2019
2018
Proceedings of the IECON 2018, 2018
Proceedings of the IECON 2018, 2018
2017
Int. J. Parallel Emergent Distributed Syst., 2017
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions.
Int. J. Found. Comput. Sci., 2017
WorldScientific, ISBN: 9789814449472, 2017
2016
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'".
CoRR, 2016
Unconditionally secure credit/debit card chip scheme and physical unclonable function.
CoRR, 2016
2015
Resource Requirements and Speed <i>versus </i>Geometry of Unconditionally Secure Physical Key Exchanges.
Entropy, 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange.
CoRR, 2015
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges.
CoRR, 2015
2014
Quantum Inf. Process., 2014
Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System.
Entropy, 2014
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.
CoRR, 2014
CoRR, 2014
On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott.
CoRR, 2014
Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?
CoRR, 2014
CoRR, 2014
2013
CoRR, 2013
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
CoRR, 2013
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters
CoRR, 2013
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange.
CoRR, 2013
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme.
CoRR, 2013
2012
Noise based logic: why noise? A comparative study of the necessity of randomness out of orthogonality
CoRR, 2012
Proceedings of the Soft Computing Applications, 2012
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012
2011
Int. J. Unconv. Comput., 2011
CoRR, 2011
Noise-based information processing: Noise-based logic and computing: what do we have so far?
CoRR, 2011
2010
Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel
CoRR, 2010
Proceedings of the Design, Automation and Test in Europe, 2010
2009
CoRR, 2009
Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra
CoRR, 2009
Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange.
CoRR, 2009
Noise-Based Logic and Computing: From Boolean Logic Gates to Brain Circuitry and Its Possible Hardware Realization.
Proceedings of the Natural Computing - 4th International Workshop on Natural Computing, 2009
2008
Unconditionally secure computers and hardware, such as memories, processors, and hard drives
CoRR, 2008
2005
Proc. IEEE, 2005
2003
Quantum Inf. Process., 2003