Name
Affiliation
Papers
LASZLO B. KISH
Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
57
Collaborators
Citations 
PageRank 
62
251
35.07
Referers 
Referees 
References 
60
251
328
Search Limit
100251
Title
Citations
PageRank
Year
Entanglement, and unsorted database search in noise-based logic.00.342019
Unconditionally Secure Control And Diagnostic Systems00.342018
Low Cost And Unconditionally Secure Communications For Complex Uas Networks00.342018
Noise-based logic gates by operations on the reference system.00.342018
Is the memristor always a passive device?00.342017
Yao'S Millionaires' Problem And Public-Key Encryption Without Computational Assumptions20.492017
Comments on "sub-KBT micro-electromechanical irreversible logic gate".00.342016
Unconditionally secure credit/debit card chip scheme and physical unclonable function.00.342016
Comments On "A New Transient Attack On The Kish Key Distribution System".00.342016
Brownian Circuits: Designs00.342016
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'".10.432016
Drawing from hats by noise-based logic10.392015
Cable Capacitance Attack Against The Kljn Secure Key Exchange30.462015
Zero and Negative Energy Dissipation at Information-Theoretic Erasure20.622015
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange.20.372015
Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges.30.392015
Current Injection Attack against the KLJN Secure Key Exchange10.352015
Do electromagnetic waves exist in a short cable at low frequencies? What does physics say?100.642014
Brain: Biological noise-based logic.10.382014
Securing vehicle communication systems by the KLJN key exchange protocol.70.462014
Bird's-eye view on Noise-Based Logic.10.392014
On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott.110.622014
Enhanced usage of keys obtained by physical, unconditionally secure distributions.10.352014
Facts, myths and fights about the KLJN classical physical key exchanger.00.342014
On KLJN-based secure key distribution in vehicular communication networks.30.382014
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system.80.502014
Errors And Their Mitigation At The Kirchhoff-Law-Johnson-Noise Secure Key Exchange100.802013
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law---Johnson-noise secure key exchange100.762013
Critical Analysis Of The Bennett-Riedel Attack On Secure Cryptographic Key Distributions Via The Kirchhoff-Law-Johnson-Noise Scheme191.122013
Enhanced secure key exchange systems based on the Johnson-noise scheme201.442013
On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator160.962013
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic100.752013
Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution Over The Smart Grid With Switched Filters130.842013
Does information have mass? [Point of View].00.342013
Times in noise-based logic: increased dimensions of logic hyperspace.00.342013
Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper).00.342012
Information Networks Secured By The Laws Of Physics70.842012
Noise based logic: why noise? A comparative study of the necessity of randomness out of orthogonality00.342012
High-dimensional noise-based logical controller00.342012
Noise based logic: Why noise?00.342012
Information theoretic security by the laws of classical physics30.642012
Effective Privacy Amplification for Secure Classical Communications111.062011
Noise-Based Information Processing Noise-Based Logic And Computing: What Do We Have So Far?00.342011
New noise-based logic representations to avoid some problems with time complexity80.882011
Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel91.382010
Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback00.342010
Instantaneous noise-based logic121.242010
Instantaneous, non-squeezed, noise-based logic101.122010
Towards brain-inspired computing111.502010
Binary fingerprints at fluctuation-enhanced sensing.00.342010
  • 1
  • 2