ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0903.2071
  4. Cited By
Notes on Recent Approaches Concerning the
  Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
v1v2v3v4v5 (latest)

Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange

12 March 2009
Laszlo B. Kish
Tamás Horváth
ArXiv (abs)PDFHTML

Papers citing "Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange"

33 / 33 papers shown
TherMod Communication: Low Power or Hot Air?
TherMod Communication: Low Power or Hot Air?Fluctuation and Noise Letters (FNL), 2025
Christiana Chamon
189
2
0
01 May 2025
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange SchemeFluctuation and Noise Letters (FNL), 2025
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
150
1
0
01 May 2025
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method
  of Random Key Generation for Decentralized Identity Protocols
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method of Random Key Generation for Decentralized Identity Protocols
Christiana Chamon
Kamalesh Mohanasundar
Sarah A. Flanery
Francis K. Quek
122
3
0
28 Dec 2023
Transient Attacks against the VMG-KLJN Secure Key Exchanger
Transient Attacks against the VMG-KLJN Secure Key ExchangerFluctuation and Noise Letters (FNL), 2023
S. Ferdous
Laszlo B. Kish
113
0
0
09 Sep 2023
Current injection and voltage insertion attacks against the VMG-KLJN
  secure key exchanger
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
105
7
0
11 Oct 2022
Time synchronization protocol for the KLJN secure key exchange scheme
Time synchronization protocol for the KLJN secure key exchange schemeFluctuation and Noise Letters (FNL), 2022
Laszlo B. Kish
192
5
0
04 Jul 2022
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against
  the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
122
1
0
16 Dec 2021
Statistical Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
96
5
0
06 Oct 2021
From cold resistor to secure key exchanger
From cold resistor to secure key exchanger
Jiaao Song
Laszlo B. Kish
80
0
0
04 Oct 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN)
  Secure Key Exchange Protocol
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
Laszlo B. Kish
119
8
0
20 Aug 2021
Deterministic Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange ProtocolFluctuation and Noise Letters (FNL), 2020
Christiana Chamon
S. Ferdous
Laszlo B. Kish
168
15
0
04 Dec 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary
  Resistors: Power, Impedance, Security
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
111
18
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
140
15
0
22 May 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
  Secure Key Exchange Protocol
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
131
13
0
21 May 2020
Man in the middle and current injection attacks against the KLJN key
  exchanger compromised by DC sources
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Mutaz Y. Melhem
Laszlo B. Kish
122
10
0
03 Apr 2020
Generalized DC loop current attack against the KLJN secure key exchange
  scheme
Generalized DC loop current attack against the KLJN secure key exchange schemeMetrology and Measurement Systems (MMS), 2019
Mutaz Y. Melhem
Laszlo B. Kish
82
11
0
30 Sep 2019
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
Mutaz Y. Melhem
Laszlo B. Kish
112
1
0
14 Jun 2018
Comments On "A New Transient Attack On The Kish Key Distribution System"
Comments On "A New Transient Attack On The Kish Key Distribution System"
Laszlo B. Kish
C. Granqvist
90
21
0
27 May 2016
Current Injection Attack against the KLJN Secure Key Exchange
Current Injection Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
M. Mohammad
Laszlo B. Kish
109
29
0
09 Dec 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
  Unconditionally Secure Key Exchange
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez
Laszlo B. Kish
143
22
0
20 Nov 2015
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise
  (RRRT-KLJN) key exchange
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange
Laszlo B. Kish
C. Granqvist
149
31
0
27 Sep 2015
Cable Capacitance Attack against the KLJN Secure Key Exchange
Cable Capacitance Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
Elias Gonzalez
Y. Saez
Laszlo B. Kish
165
30
0
11 Aug 2015
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange
  system using arbitrary resistors
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistorsScientific Reports (Sci Rep), 2015
G. Vadai
R. Mingesz
Z. Gingl
144
46
0
02 Jun 2015
Resource requirements and speed versus geometry of unconditionally
  secure physical key exchanges
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Elias Gonzalez
Robert Balog
Laszlo B. Kish
107
25
0
24 Apr 2015
Facts, myths and fights about the KLJN classical physical key exchanger
Facts, myths and fights about the KLJN classical physical key exchanger
Laszlo B. Kish
Derek Abbott
C. Granqvist
He Wen
98
0
0
18 Aug 2014
What kind of noise guarantees security for the
  Kirchhoff-Loop-Johnson-Noise key exchange?
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?
R. Mingesz
G. Vadai
Z. Gingl
150
18
0
06 May 2014
Do electromagnetic waves exist in a short cable at low frequencies? What
  does physics say?
Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?
Hsien-Pu Chen
Laszlo B. Kish
C. Granqvist
G. Schmera
166
18
0
17 Apr 2014
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure
  communication system
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication systemPLoS ONE (PLoS ONE), 2014
Z. Gingl
R. Mingesz
135
45
0
27 Mar 2014
Critical analysis of the Bennett-Riedel attack on secure cryptographic
  key distributions via the Kirchhoff-law-Johnson-noise scheme
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise schemePLoS ONE (PLoS ONE), 2013
Laszlo B. Kish
Derek Abbott
C. Granqvist
304
50
0
27 Jun 2013
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure
  key exchange
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchangePLoS ONE (PLoS ONE), 2013
Y. Saez
Laszlo B. Kish
165
49
0
21 May 2013
Enhanced secure key exchange systems based on the Johnson-noise scheme
Enhanced secure key exchange systems based on the Johnson-noise scheme
Laszlo B. Kish
116
57
0
15 Feb 2013
Information Networks Secured by the Laws of Physics
Information Networks Secured by the Laws of PhysicsIEICE transactions on communications (IEICE Trans. Commun.), 2011
Laszlo B. Kish
F. Peper
223
36
0
18 Oct 2011
Cracking the Liu key exchange protocol in its most secure state with
  Lorentzian spectra
Cracking the Liu key exchange protocol in its most secure state with Lorentzian spectra
L. Kish
Bruce Zhang
Laszlo B. Kish
298
9
0
05 Oct 2009
1
Page 1 of 1