ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2505.00849
  4. Cited By
TherMod Communication: Low Power or Hot Air?
v1v2v3 (latest)

TherMod Communication: Low Power or Hot Air?

1 May 2025
Christiana Chamon
ArXiv (abs)PDFHTML

Papers citing "TherMod Communication: Low Power or Hot Air?"

36 / 36 papers shown
Title
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Duality on the Thermodynamics of the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Scheme
Sarah A. Flanery
Anson Trapani
Christiana Chamon
Leyla Nazhandali
39
0
0
01 May 2025
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method
  of Random Key Generation for Decentralized Identity Protocols
Kirchhoff-Law Johnson Noise Meets Web 3.0: A Statistical Physical Method of Random Key Generation for Decentralized Identity Protocols
Christiana Chamon
Kamalesh Mohanasundar
Sarah A. Flanery
Francis K. Quek
26
3
0
28 Dec 2023
Current injection and voltage insertion attacks against the VMG-KLJN
  secure key exchanger
Current injection and voltage insertion attacks against the VMG-KLJN secure key exchanger
S. Ferdous
Christiana Chamon
Laszlo B. Kish
41
4
0
11 Oct 2022
Statistical Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
45
4
0
06 Oct 2021
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN)
  Secure Key Exchange Protocol
Nonlinearity Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol
Christiana Chamon
Laszlo B. Kish
47
6
0
20 Aug 2021
Perspective -- On the thermodynamics of perfect unconditional security
Perspective -- On the thermodynamics of perfect unconditional security
Christiana Chamon
Laszlo B. Kish
29
12
0
26 May 2021
Deterministic Random Number Generator Attack against the
  Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
34
13
0
04 Dec 2020
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary
  Resistors: Power, Impedance, Security
Comments on the "Generalized" KLJN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
S. Ferdous
Christiana Chamon
Laszlo B. Kish
43
10
0
08 Oct 2020
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
AC Loop Current Attacks Against The KLJN Secure Key Exchange Scheme
Mutaz Y. Melhem
Christiana Chamon
S. Ferdous
Laszlo B. Kish
44
12
0
22 May 2020
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise
  Secure Key Exchange Protocol
Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol
Christiana Chamon
S. Ferdous
Laszlo B. Kish
35
11
0
21 May 2020
Man in the middle and current injection attacks against the KLJN key
  exchanger compromised by DC sources
Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
Mutaz Y. Melhem
Laszlo B. Kish
36
9
0
03 Apr 2020
Generalized DC loop current attack against the KLJN secure key exchange
  scheme
Generalized DC loop current attack against the KLJN secure key exchange scheme
Mutaz Y. Melhem
Laszlo B. Kish
26
10
0
30 Sep 2019
Comments On "A New Transient Attack On The Kish Key Distribution System"
Comments On "A New Transient Attack On The Kish Key Distribution System"
Laszlo B. Kish
C. Granqvist
29
19
0
27 May 2016
Unconditionally secure credit/debit card chip scheme and physical
  unclonable function
Unconditionally secure credit/debit card chip scheme and physical unclonable function
Laszlo B. Kish
K. Entesari
C. Granqvist
C. Kwan
35
23
0
08 May 2016
Current Injection Attack against the KLJN Secure Key Exchange
Current Injection Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
M. Mohammad
Laszlo B. Kish
30
26
0
09 Dec 2015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with
  Unconditionally Secure Key Exchange
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange
Elias Gonzalez
Laszlo B. Kish
56
20
0
20 Nov 2015
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise
  (RRRT-KLJN) key exchange
Random-resistor-random-temperature Kirchhoff-law-Johnson-noise (RRRT-KLJN) key exchange
Laszlo B. Kish
C. Granqvist
53
29
0
27 Sep 2015
Cable Capacitance Attack against the KLJN Secure Key Exchange
Cable Capacitance Attack against the KLJN Secure Key Exchange
Hsien-Pu Chen
Elias Gonzalez
Y. Saez
Laszlo B. Kish
56
28
0
11 Aug 2015
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange
  system using arbitrary resistors
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
G. Vadai
R. Mingesz
Z. Gingl
53
36
0
02 Jun 2015
Resource requirements and speed versus geometry of unconditionally
  secure physical key exchanges
Resource requirements and speed versus geometry of unconditionally secure physical key exchanges
Elias Gonzalez
Robert Balog
Laszlo B. Kish
42
23
0
24 Apr 2015
Analysis of an attenuator artifact in an experimental attack by
  Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key
  exchange system
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system
Laszlo B. Kish
Z. Gingl
R. Mingesz
G. Vadai
J. Smulko
C. Granqvist
40
33
0
04 Nov 2014
On KLJN-based secure key distribution in vehicular communication
  networks
On KLJN-based secure key distribution in vehicular communication networks
Xiaolin Cao
Y. Saez
G. Pesti
Laszlo B. Kish
61
17
0
20 Sep 2014
Enhanced usage of keys obtained by physical, unconditionally secure
  distributions
Enhanced usage of keys obtained by physical, unconditionally secure distributions
Laszlo B. Kish
58
20
0
21 Aug 2014
What kind of noise guarantees security for the
  Kirchhoff-Loop-Johnson-Noise key exchange?
What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange?
R. Mingesz
G. Vadai
Z. Gingl
53
15
0
06 May 2014
Do electromagnetic waves exist in a short cable at low frequencies? What
  does physics say?
Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?
Hsien-Pu Chen
Laszlo B. Kish
C. Granqvist
G. Schmera
60
16
0
17 Apr 2014
Securing vehicle communication systems by the KLJN key exchange protocol
Securing vehicle communication systems by the KLJN key exchange protocol
Y. Saez
Xiaolin Cao
Laszlo B. Kish
G. Pesti
75
30
0
07 Apr 2014
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure
  communication system
Noise properties in the ideal Kirchhoff-Law-Johnson-Noise secure communication system
Z. Gingl
R. Mingesz
66
39
0
27 Mar 2014
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator
On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator
Laszlo B. Kish
C. Granqvist
56
55
0
16 Sep 2013
Current and voltage based bit errors and their combined mitigation for
  the Kirchhoff-law-Johnson-noise secure key exchange
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange
Y. Saez
Laszlo B. Kish
R. Mingesz
Z. Gingl
C. Granqvist
57
37
0
21 Aug 2013
Critical analysis of the Bennett-Riedel attack on secure cryptographic
  key distributions via the Kirchhoff-law-Johnson-noise scheme
Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme
Laszlo B. Kish
Derek Abbott
C. Granqvist
92
48
0
27 Jun 2013
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure
  key exchange
Errors and their mitigation at the Kirchhoff-law-Johnson-noise secure key exchange
Y. Saez
Laszlo B. Kish
70
42
0
21 May 2013
Information theoretically secure, enhanced Johnson noise based key
  distribution over the smart grid with switched filters
Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters
Elias Gonzalez
Laszlo B. Kish
Robert Balog
P. Enjeti
76
45
0
13 Mar 2013
Information Networks Secured by the Laws of Physics
Information Networks Secured by the Laws of Physics
Laszlo B. Kish
F. Peper
83
34
0
18 Oct 2011
Effective Privacy Amplification for Secure Classical Communications
Effective Privacy Amplification for Secure Classical Communications
Tamás Horváth
Laszlo B. Kish
J. Scheuer
80
50
0
22 Jan 2011
Notes on Recent Approaches Concerning the
  Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
Laszlo B. Kish
Tamás Horváth
144
58
0
12 Mar 2009
Unconditionally secure computers, algorithms and hardware, such as
  memories, processors, keyboards, flash and hard drives
Unconditionally secure computers, algorithms and hardware, such as memories, processors, keyboards, flash and hard drives
Laszlo B. Kish
O. Saidi
99
46
0
31 Mar 2008
1