ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1411.0818
  4. Cited By
Analysis of an attenuator artifact in an experimental attack by
  Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key
  exchange system

Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system

4 November 2014
Laszlo B. Kish
Z. Gingl
R. Mingesz
G. Vadai
J. Smulko
C. Granqvist
ArXiv (abs)PDFHTML

Papers citing "Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system"

23 / 23 papers shown
Title
TherMod Communication: Low Power or Hot Air?
TherMod Communication: Low Power or Hot Air?
Christiana Chamon
67
1
0
01 May 2025
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
42
0
0
01 May 2025
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method
  of Random Key Generation for Decentralized Identity Protocols
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method of Random Key Generation for Decentralized Identity Protocols
Christiana Chamon
Kamalesh Mohanasundar
Sarah A. Flanery
Francis K. Quek
31
3
0
28 Dec 2023
Transient Attacks against the VMG-KLJN Secure Key Exchanger
Transient Attacks against the VMG-KLJN Secure Key Exchanger
S. Ferdous
Laszlo B. Kish
22
0
0
09 Sep 2023
Current injection and voltage insertion attacks against the VMG-KLJN
  secure key exchanger
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
44
4
0
11 Oct 2022
Time synchronization protocol for the KLJN secure key exchange scheme
Time synchronization protocol for the KLJN secure key exchange scheme
Laszlo B. Kish
144
4
0
04 Jul 2022
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against
  the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Random Number Generator, Zero-Crossing, and Nonlinearity Attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
38
1
0
16 Dec 2021
Statistical Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
48
4
0
06 Oct 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN)
  Secure Key Exchange Protocol
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
Laszlo B. Kish
54
6
0
20 Aug 2021
Deterministic Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
42
13
0
04 Dec 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary
  Resistors: Power, Impedance, Security
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
43
10
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
44
12
0
22 May 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
  Secure Key Exchange Protocol
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
41
11
0
21 May 2020
Man in the middle and current injection attacks against the KLJN key
  exchanger compromised by DC sources
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Mutaz Y. Melhem
Laszlo B. Kish
42
9
0
03 Apr 2020
Generalized DC loop current attack against the KLJN secure key exchange
  scheme
Generalized DC loop current attack against the KLJN secure key exchange scheme
Mutaz Y. Melhem
Laszlo B. Kish
34
10
0
30 Sep 2019
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
A Static-Loop-Current Attack against the KLJN Secure Key Exchange System
Mutaz Y. Melhem
Laszlo B. Kish
25
1
0
14 Jun 2018
Comments On "A New Transient Attack On The Kish Key Distribution System"
Comments On "A New Transient Attack On The Kish Key Distribution System"
Laszlo B. Kish
C. Granqvist
37
19
0
27 May 2016
Current Injection Attack against the KLJN Secure Key Exchange
Current Injection Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
M. Mohammad
Laszlo B. Kish
38
26
0
09 Dec 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
  Unconditionally Secure Key Exchange
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez
Laszlo B. Kish
57
20
0
20 Nov 2015
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise
  (RRRT-KLJN) key exchange
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange
Laszlo B. Kish
C. Granqvist
60
29
0
27 Sep 2015
Cable Capacitance Attack against the KLJN Secure Key Exchange
Cable Capacitance Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
Elias Gonzalez
Y. Saez
Laszlo B. Kish
58
28
0
11 Aug 2015
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange
  system using arbitrary resistors
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
G. Vadai
R. Mingesz
Z. Gingl
56
36
0
02 Jun 2015
Resource requirements and speed versus geometry of unconditionally
  secure physical key exchanges
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Elias Gonzalez
Robert Balog
Laszlo B. Kish
48
23
0
24 Apr 2015
1