Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1101.4264
Cited By
v1
v2 (latest)
Effective Privacy Amplification for Secure Classical Communications
22 January 2011
Tamás Horváth
Laszlo B. Kish
J. Scheuer
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Effective Privacy Amplification for Secure Classical Communications"
14 / 14 papers shown
Title
TherMod Communication: Low Power or Hot Air?
Christiana Chamon
67
1
0
01 May 2025
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
42
0
0
01 May 2025
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
44
4
0
11 Oct 2022
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
38
1
0
16 Dec 2021
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
48
4
0
06 Oct 2021
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
43
10
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
44
12
0
22 May 2020
Unconditionally secure credit/debit card chip scheme and physical unclonable function
Laszlo B. Kish
K. Entesari
C. Granqvist
C. Kwan
38
23
0
08 May 2016
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
Laszlo B. Kish
Z. Gingl
R. Mingesz
G. Vadai
J. Smulko
C. Granqvist
45
33
0
04 Nov 2014
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator
Laszlo B. Kish
C. Granqvist
59
55
0
16 Sep 2013
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme
Laszlo B. Kish
Derek Abbott
C. Granqvist
95
48
0
27 Jun 2013
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange
Y. Saez
Laszlo B. Kish
73
42
0
21 May 2013
Enhanced secure key exchange systems based on the Johnson-noise scheme
Laszlo B. Kish
71
55
0
15 Feb 2013
Information Networks Secured by the Laws of Physics
Laszlo B. Kish
F. Peper
88
34
0
18 Oct 2011
1