Entanglement, and unsorted database search in noise-based logic. | 0 | 0.34 | 2019 |
Unconditionally Secure Control And Diagnostic Systems | 0 | 0.34 | 2018 |
Low Cost And Unconditionally Secure Communications For Complex Uas Networks | 0 | 0.34 | 2018 |
Noise-based logic gates by operations on the reference system. | 0 | 0.34 | 2018 |
Is the memristor always a passive device? | 0 | 0.34 | 2017 |
Yao'S Millionaires' Problem And Public-Key Encryption Without Computational Assumptions | 2 | 0.49 | 2017 |
Comments on "sub-KBT micro-electromechanical irreversible logic gate". | 0 | 0.34 | 2016 |
Unconditionally secure credit/debit card chip scheme and physical unclonable function. | 0 | 0.34 | 2016 |
Comments On "A New Transient Attack On The Kish Key Distribution System". | 0 | 0.34 | 2016 |
Brownian Circuits: Designs | 0 | 0.34 | 2016 |
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'". | 1 | 0.43 | 2016 |
Drawing from hats by noise-based logic | 1 | 0.39 | 2015 |
Cable Capacitance Attack Against The Kljn Secure Key Exchange | 3 | 0.46 | 2015 |
Zero and Negative Energy Dissipation at Information-Theoretic Erasure | 2 | 0.62 | 2015 |
Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange. | 2 | 0.37 | 2015 |
Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges. | 3 | 0.39 | 2015 |
Current Injection Attack against the KLJN Secure Key Exchange | 1 | 0.35 | 2015 |
Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? | 10 | 0.64 | 2014 |
Brain: Biological noise-based logic. | 1 | 0.38 | 2014 |
Securing vehicle communication systems by the KLJN key exchange protocol. | 7 | 0.46 | 2014 |
Bird's-eye view on Noise-Based Logic. | 1 | 0.39 | 2014 |
On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott. | 11 | 0.62 | 2014 |
Enhanced usage of keys obtained by physical, unconditionally secure distributions. | 1 | 0.35 | 2014 |
Facts, myths and fights about the KLJN classical physical key exchanger. | 0 | 0.34 | 2014 |
On KLJN-based secure key distribution in vehicular communication networks. | 3 | 0.38 | 2014 |
Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. | 8 | 0.50 | 2014 |
Errors And Their Mitigation At The Kirchhoff-Law-Johnson-Noise Secure Key Exchange | 10 | 0.80 | 2013 |
Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law---Johnson-noise secure key exchange | 10 | 0.76 | 2013 |
Critical Analysis Of The Bennett-Riedel Attack On Secure Cryptographic Key Distributions Via The Kirchhoff-Law-Johnson-Noise Scheme | 19 | 1.12 | 2013 |
Enhanced secure key exchange systems based on the Johnson-noise scheme | 20 | 1.44 | 2013 |
On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator | 16 | 0.96 | 2013 |
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic | 10 | 0.75 | 2013 |
Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution Over The Smart Grid With Switched Filters | 13 | 0.84 | 2013 |
Does information have mass? [Point of View]. | 0 | 0.34 | 2013 |
Times in noise-based logic: increased dimensions of logic hyperspace. | 0 | 0.34 | 2013 |
Information Theoretic Security by the Laws of Classical Physics - (Plenary Paper). | 0 | 0.34 | 2012 |
Information Networks Secured By The Laws Of Physics | 7 | 0.84 | 2012 |
Noise based logic: why noise? A comparative study of the necessity of randomness out of orthogonality | 0 | 0.34 | 2012 |
High-dimensional noise-based logical controller | 0 | 0.34 | 2012 |
Noise based logic: Why noise? | 0 | 0.34 | 2012 |
Information theoretic security by the laws of classical physics | 3 | 0.64 | 2012 |
Effective Privacy Amplification for Secure Classical Communications | 11 | 1.06 | 2011 |
Noise-Based Information Processing Noise-Based Logic And Computing: What Do We Have So Far? | 0 | 0.34 | 2011 |
New noise-based logic representations to avoid some problems with time complexity | 8 | 0.88 | 2011 |
Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel | 9 | 1.38 | 2010 |
Ultimate crack and lack of any security in the statistical key exchange protocol with random signals and feedback | 0 | 0.34 | 2010 |
Instantaneous noise-based logic | 12 | 1.24 | 2010 |
Instantaneous, non-squeezed, noise-based logic | 10 | 1.12 | 2010 |
Towards brain-inspired computing | 11 | 1.50 | 2010 |
Binary fingerprints at fluctuation-enhanced sensing. | 0 | 0.34 | 2010 |