Laszlo B. Kish

Orcid: 0000-0002-8917-954X

Affiliations:
  • Texas A&M University, College Station, TX, USA


According to our database1, Laszlo B. Kish authored at least 83 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Simple Cracking of (Noise-Based) Dynamic Watermarking in Smart Grids.
CoRR, 2024

Smart Grids Secured By Dynamic Watermarking: How Secure?
CoRR, 2024

2023
Crypto analysis of the key distribution scheme using noise-free resistances.
CoRR, 2023

Transient Attacks against the VMG-KLJN Secure Key Exchanger.
CoRR, 2023

Ternary Instantaneous Noise-based Logic.
CoRR, 2023

XOR and XNOR gates in instantaneous noise based logic.
CoRR, 2023

Transient Attack against the KLJN Secure Key Exchanger.
CoRR, 2023

2022
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger.
CoRR, 2022

Time synchronization protocol for the KLJN secure key exchange scheme.
CoRR, 2022

2021
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol.
CoRR, 2021

From cold resistor to secure key exchanger.
CoRR, 2021

Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol.
CoRR, 2021

Perspective - On the thermodynamics of perfect unconditional security.
CoRR, 2021

2020
Fluctuation-Enhanced Sensing.
J. Sensors, 2020

Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol.
CoRR, 2020

Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security.
CoRR, 2020

AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme.
CoRR, 2020

Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol.
CoRR, 2020

Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources.
CoRR, 2020

2019
Generalized DC loop current attack against the KLJN secure key exchange scheme.
CoRR, 2019

Entanglement, and unsorted database search in noise-based logic.
CoRR, 2019

2018
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System.
CoRR, 2018

Noise-based logic gates by operations on the reference system.
CoRR, 2018

Low Cost and Unconditionally Secure Communications for Complex UAS Networks.
Proceedings of the IECON 2018, 2018

Unconditionally Secure Control and Diagnostic Systems.
Proceedings of the IECON 2018, 2018

2017
Drawing from hats by noise-based logic.
Int. J. Parallel Emergent Distributed Syst., 2017

Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions.
Int. J. Found. Comput. Sci., 2017

Is the memristor always a passive device?
CoRR, 2017

The Kish Cypher - The Story of KLJN for Unconditional Security
WorldScientific, ISBN: 9789814449472, 2017

2016
Brownian Circuits: Designs.
Int. J. Unconv. Comput., 2016

Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'".
CoRR, 2016

Comments On "A New Transient Attack On The Kish Key Distribution System".
CoRR, 2016

Unconditionally secure credit/debit card chip scheme and physical unclonable function.
CoRR, 2016

Comments on "sub-KBT micro-electromechanical irreversible logic gate".
CoRR, 2016

2015
Cable Capacitance Attack against the KLJN Secure Key Exchange.
Inf., 2015

Resource Requirements and Speed <i>versus </i>Geometry of Unconditionally Secure Physical Key Exchanges.
Entropy, 2015

Zero and negative energy dissipation at information-theoretic erasure.
CoRR, 2015

Random-resistor-random-temperature KLJN key exchange.
CoRR, 2015

Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange.
CoRR, 2015

Resource requirements and speed versus geometry of unconditionally secure physical key exchanges.
CoRR, 2015

Current Injection Attack against the KLJN Secure Key Exchange.
CoRR, 2015

2014
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator.
Quantum Inf. Process., 2014

Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System.
Entropy, 2014

Securing vehicle communication systems by the KLJN key exchange protocol.
CoRR, 2014

Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.
CoRR, 2014

Bird's-eye view on Noise-Based Logic.
CoRR, 2014

Brain: Biological noise-based logic.
CoRR, 2014

Facts, myths and fights about the KLJN classical physical key exchanger.
CoRR, 2014

Enhanced usage of keys obtained by physical, unconditionally secure distributions.
CoRR, 2014

On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott.
CoRR, 2014

Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?
CoRR, 2014

On KLJN-based secure key distribution in vehicular communication networks.
CoRR, 2014

2013
Does information have mass? [Point of View].
Proc. IEEE, 2013

Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange
CoRR, 2013

Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
CoRR, 2013

Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters
CoRR, 2013

Enhanced secure key exchange systems based on the Johnson-noise scheme
CoRR, 2013

Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange.
CoRR, 2013

Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme.
CoRR, 2013

Times in noise-based logic: increased dimensions of logic hyperspace.
CoRR, 2013

2012
Information Networks Secured by the Laws of Physics.
IEICE Trans. Commun., 2012

Information theoretic security by the laws of classical physics
CoRR, 2012

High-dimensional noise-based logical controller
CoRR, 2012

Noise based logic: why noise? A comparative study of the necessity of randomness out of orthogonality
CoRR, 2012

Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper).
Proceedings of the Soft Computing Applications, 2012

Noise based logic: Why noise?
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

2011
Noise-based Deterministic Logic and Computing: a Brief Survey.
Int. J. Unconv. Comput., 2011

New noise-based logic representations to avoid some problems with time complexity
CoRR, 2011

Noise-based information processing: Noise-based logic and computing: what do we have so far?
CoRR, 2011

Effective Privacy Amplification for Secure Classical Communications
CoRR, 2011

2010
Binary Fingerprints at Fluctuation-Enhanced Sensing.
Sensors, 2010

Instantaneous, non-squeezed, noise-based logic
CoRR, 2010

Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel
CoRR, 2010

Instantaneous noise-based logic
CoRR, 2010

Towards brain-inspired computing
CoRR, 2010

Implementing digital logic with sinusoidal supplies.
Proceedings of the Design, Automation and Test in Europe, 2010

2009
Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's Laws
CoRR, 2009

Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra
CoRR, 2009

Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange.
CoRR, 2009

Noise-Based Logic and Computing: From Boolean Logic Gates to Brain Circuitry and Its Possible Hardware Realization.
Proceedings of the Natural Computing - 4th International Workshop on Natural Computing, 2009

2008
Unconditionally secure computers and hardware, such as memories, processors, and hard drives
CoRR, 2008

2005
Future Directions in Electronic Computing and Information Processing.
Proc. IEEE, 2005

2003
Dreams Versus Reality: Plenary Debate Session on Quantum Computing.
Quantum Inf. Process., 2003


  Loading...