ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0803.4479
  4. Cited By
Unconditionally secure computers, algorithms and hardware, such as
  memories, processors, keyboards, flash and hard drives
v1v2v3 (latest)

Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives

31 March 2008
Laszlo B. Kish
O. Saidi
ArXiv (abs)PDFHTML

Papers citing "Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives"

31 / 31 papers shown
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange SchemeFluctuation and Noise Letters (FNL), 2025
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
146
1
0
01 May 2025
TherMod Communication: Low Power or Hot Air?
TherMod Communication: Low Power or Hot Air?Fluctuation and Noise Letters (FNL), 2025
Christiana Chamon
179
2
0
01 May 2025
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method
  of Random Key Generation for Decentralized Identity Protocols
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method of Random Key Generation for Decentralized Identity Protocols
Christiana Chamon
Kamalesh Mohanasundar
Sarah A. Flanery
Francis K. Quek
120
3
0
28 Dec 2023
Transient Attacks against the VMG-KLJN Secure Key Exchanger
Transient Attacks against the VMG-KLJN Secure Key ExchangerFluctuation and Noise Letters (FNL), 2023
S. Ferdous
Laszlo B. Kish
111
0
0
09 Sep 2023
Current injection and voltage insertion attacks against the VMG-KLJN
  secure key exchanger
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
102
7
0
11 Oct 2022
Time synchronization protocol for the KLJN secure key exchange scheme
Time synchronization protocol for the KLJN secure key exchange schemeFluctuation and Noise Letters (FNL), 2022
Laszlo B. Kish
189
5
0
04 Jul 2022
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against
  the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
118
1
0
16 Dec 2021
Statistical Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
96
5
0
06 Oct 2021
From cold resistor to secure key exchanger
From cold resistor to secure key exchanger
Jiaao Song
Laszlo B. Kish
74
0
0
04 Oct 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN)
  Secure Key Exchange Protocol
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
Laszlo B. Kish
116
8
0
20 Aug 2021
Deterministic Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange ProtocolFluctuation and Noise Letters (FNL), 2020
Christiana Chamon
S. Ferdous
Laszlo B. Kish
164
15
0
04 Dec 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary
  Resistors: Power, Impedance, Security
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
109
18
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
137
15
0
22 May 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
  Secure Key Exchange Protocol
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
130
13
0
21 May 2020
Man in the middle and current injection attacks against the KLJN key
  exchanger compromised by DC sources
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Mutaz Y. Melhem
Laszlo B. Kish
118
10
0
03 Apr 2020
Unconditionally secure credit/debit card chip scheme and physical
  unclonable function
Unconditionally secure credit/debit card chip scheme and physical unclonable function
Laszlo B. Kish
K. Entesari
C. Granqvist
C. Kwan
117
25
0
08 May 2016
Current Injection Attack against the KLJN Secure Key Exchange
Current Injection Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
M. Mohammad
Laszlo B. Kish
99
29
0
09 Dec 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
  Unconditionally Secure Key Exchange
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez
Laszlo B. Kish
137
22
0
20 Nov 2015
Cable Capacitance Attack against the KLJN Secure Key Exchange
Cable Capacitance Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
Elias Gonzalez
Y. Saez
Laszlo B. Kish
157
30
0
11 Aug 2015
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange
  system using arbitrary resistors
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistorsScientific Reports (Sci Rep), 2015
G. Vadai
R. Mingesz
Z. Gingl
135
46
0
02 Jun 2015
Resource requirements and speed versus geometry of unconditionally
  secure physical key exchanges
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Elias Gonzalez
Robert Balog
Laszlo B. Kish
99
25
0
24 Apr 2015
On KLJN-based secure key distribution in vehicular communication
  networks
On KLJN-based secure key distribution in vehicular communication networks
Xiaolin Cao
Y. Saez
G. Pesti
Laszlo B. Kish
159
20
0
20 Sep 2014
What kind of noise guarantees security for the
  Kirchhoff-Loop-Johnson-Noise key exchange?
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?
R. Mingesz
G. Vadai
Z. Gingl
144
18
0
06 May 2014
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure
  communication system
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication systemPLoS ONE (PLoS ONE), 2014
Z. Gingl
R. Mingesz
130
45
0
27 Mar 2014
Current and voltage based bit errors and their combined mitigation for
  the Kirchhoff-law-Johnson-noise secure key exchange
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchangeJournal of Computational Electronics (J. Comput. Electron.), 2013
Y. Saez
Laszlo B. Kish
R. Mingesz
Z. Gingl
C. Granqvist
152
43
0
21 Aug 2013
Critical analysis of the Bennett-Riedel attack on secure cryptographic
  key distributions via the Kirchhoff-law-Johnson-noise scheme
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise schemePLoS ONE (PLoS ONE), 2013
Laszlo B. Kish
Derek Abbott
C. Granqvist
295
50
0
27 Jun 2013
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure
  key exchange
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchangePLoS ONE (PLoS ONE), 2013
Y. Saez
Laszlo B. Kish
158
49
0
21 May 2013
Physical uncloneable function hardware keys utilizing
  Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
Laszlo B. Kish
C. Kwan
159
22
0
12 May 2013
Information theoretically secure, enhanced Johnson noise based key
  distribution over the smart grid with switched filters
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filtersPLoS ONE (PLoS ONE), 2013
Elias Gonzalez
Laszlo B. Kish
Robert Balog
P. Enjeti
185
48
0
13 Mar 2013
Enhanced secure key exchange systems based on the Johnson-noise scheme
Enhanced secure key exchange systems based on the Johnson-noise scheme
Laszlo B. Kish
110
57
0
15 Feb 2013
Information Networks Secured by the Laws of Physics
Information Networks Secured by the Laws of PhysicsIEICE transactions on communications (IEICE Trans. Commun.), 2011
Laszlo B. Kish
F. Peper
216
36
0
18 Oct 2011
1
Page 1 of 1