ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1110.4367
  4. Cited By
Information Networks Secured by the Laws of Physics
v1v2 (latest)

Information Networks Secured by the Laws of Physics

IEICE transactions on communications (IEICE Trans. Commun.), 2011
18 October 2011
Laszlo B. Kish
F. Peper
ArXiv (abs)PDFHTML

Papers citing "Information Networks Secured by the Laws of Physics"

24 / 24 papers shown
TherMod Communication: Low Power or Hot Air?
TherMod Communication: Low Power or Hot Air?Fluctuation and Noise Letters (FNL), 2025
Christiana Chamon
197
2
0
01 May 2025
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange SchemeFluctuation and Noise Letters (FNL), 2025
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
153
1
0
01 May 2025
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method
  of Random Key Generation for Decentralized Identity Protocols
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method of Random Key Generation for Decentralized Identity Protocols
Christiana Chamon
Kamalesh Mohanasundar
Sarah A. Flanery
Francis K. Quek
125
3
0
28 Dec 2023
Transient Attacks against the VMG-KLJN Secure Key Exchanger
Transient Attacks against the VMG-KLJN Secure Key ExchangerFluctuation and Noise Letters (FNL), 2023
S. Ferdous
Laszlo B. Kish
120
0
0
09 Sep 2023
Current injection and voltage insertion attacks against the VMG-KLJN
  secure key exchanger
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
116
7
0
11 Oct 2022
Time synchronization protocol for the KLJN secure key exchange scheme
Time synchronization protocol for the KLJN secure key exchange schemeFluctuation and Noise Letters (FNL), 2022
Laszlo B. Kish
198
5
0
04 Jul 2022
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against
  the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
122
1
0
16 Dec 2021
Statistical Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
97
5
0
06 Oct 2021
From cold resistor to secure key exchanger
From cold resistor to secure key exchanger
Jiaao Song
Laszlo B. Kish
80
0
0
04 Oct 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN)
  Secure Key Exchange Protocol
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
Laszlo B. Kish
119
8
0
20 Aug 2021
Deterministic Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange ProtocolFluctuation and Noise Letters (FNL), 2020
Christiana Chamon
S. Ferdous
Laszlo B. Kish
181
15
0
04 Dec 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary
  Resistors: Power, Impedance, Security
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
111
18
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
142
15
0
22 May 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
  Secure Key Exchange Protocol
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
134
13
0
21 May 2020
Man in the middle and current injection attacks against the KLJN key
  exchanger compromised by DC sources
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Mutaz Y. Melhem
Laszlo B. Kish
122
10
0
03 Apr 2020
Current Injection Attack against the KLJN Secure Key Exchange
Current Injection Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
M. Mohammad
Laszlo B. Kish
119
29
0
09 Dec 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
  Unconditionally Secure Key Exchange
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez
Laszlo B. Kish
145
22
0
20 Nov 2015
Cable Capacitance Attack against the KLJN Secure Key Exchange
Cable Capacitance Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
Elias Gonzalez
Y. Saez
Laszlo B. Kish
167
30
0
11 Aug 2015
Resource requirements and speed versus geometry of unconditionally
  secure physical key exchanges
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Elias Gonzalez
Robert Balog
Laszlo B. Kish
111
25
0
24 Apr 2015
Current and voltage based bit errors and their combined mitigation for
  the Kirchhoff-law-Johnson-noise secure key exchange
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchangeJournal of Computational Electronics (J. Comput. Electron.), 2013
Y. Saez
Laszlo B. Kish
R. Mingesz
Z. Gingl
C. Granqvist
160
43
0
21 Aug 2013
Critical analysis of the Bennett-Riedel attack on secure cryptographic
  key distributions via the Kirchhoff-law-Johnson-noise scheme
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise schemePLoS ONE (PLoS ONE), 2013
Laszlo B. Kish
Derek Abbott
C. Granqvist
313
50
0
27 Jun 2013
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure
  key exchange
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchangePLoS ONE (PLoS ONE), 2013
Y. Saez
Laszlo B. Kish
167
49
0
21 May 2013
Information theoretically secure, enhanced Johnson noise based key
  distribution over the smart grid with switched filters
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filtersPLoS ONE (PLoS ONE), 2013
Elias Gonzalez
Laszlo B. Kish
Robert Balog
P. Enjeti
196
48
0
13 Mar 2013
Enhanced secure key exchange systems based on the Johnson-noise scheme
Enhanced secure key exchange systems based on the Johnson-noise scheme
Laszlo B. Kish
131
57
0
15 Feb 2013
1
Page 1 of 1