SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Granqvist Claes Göran) ;pers:(Kish Laszlo B.)"

Sökning: WFRF:(Granqvist Claes Göran) > Kish Laszlo B.

  • Resultat 1-10 av 21
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Aroutiounian, Vladimir M., et al. (författare)
  • Noise spectroscopy of gas sensors
  • 2008
  • Ingår i: IEEE Sensors Journal. - 1530-437X .- 1558-1748. ; 8:5-6, s. 786-790
  • Tidskriftsartikel (refereegranskat)abstract
    • We study current-voltages and low-frequency noise characteristics of the metal-porous silicon-silicon single crystal-metal structure with 50% and 73% porosity of porous silicon. The study is performed in dry air and in a mix of dry air with carbon monoxide of different concentrations. The Hooge noise parameter alpha(H) and the parameter gamma in the frequency dependence of the noise voltage spectral density S-U (f) were determined from experimental data. High sensitivity of spectral dependence of noise to gas concentration allows offering powerful method for determination of gas concentration in the air or environment.
  •  
2.
  • Chen, Hsien-Pu, et al. (författare)
  • Do Electromagnetic Waves Exist in a Short Cable at Low Frequencies? : What Does Physics Say?
  • 2014
  • Ingår i: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 13:2, s. 1450016-
  • Tidskriftsartikel (refereegranskat)abstract
    • We refute a physical model, recently proposed by Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf], to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. Their model, and its theoretical underpinnings, is found to be fundamentally flawed because their assumption of electromagnetic waves violates not only the wave equation but also the second law of thermodynamics, the principle of detailed balance, Boltzmann's energy equipartition theorem, and Planck's formula by implying infinitely strong blackbody radiation. We deduce the correct mathematical model of the GAA scheme, which is based on impedances at the quasi-static limit. Mathematical analysis and simulation results confirm our approach and prove that GAA's experimental interpretation is incorrect too.
  •  
3.
  • Chen, Hsien-Pu, et al. (författare)
  • On The "Cracking" Scheme in The Paper "A Directional Coupler Attack Against the Kish Key Distribution System" by Gunn, Allison And Abbott
  • 2014
  • Ingår i: METROLOGY AND MEASUREMENT SYSTEMS. - : Polish Academy of Sciences Chancellery. - 0860-8229 .- 2300-1941. ; 21:3, s. 389-400
  • Tidskriftsartikel (refereegranskat)abstract
    • Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA's mathematical model is unphysical. Here we analyze GAA's cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA's claim to be experimentally capable of distinguishing-using statistics over a few correlation times only-the distributions of two Gaussian noises with a relative variance difference of less than 10(-8). Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA's assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the time-derivative nature of GAA's scheme which tends to enhance all of these artifacts.
  •  
4.
  • Gingl, Zoltan, et al. (författare)
  • Fluctuation-Enhanced Sensing With Zero-Crossing Analysis for High-Speed and Low-Power Applications
  • 2010
  • Ingår i: IEEE Sensors Journal. - 1530-437X .- 1558-1748. ; 10:3, s. 492-497
  • Tidskriftsartikel (refereegranskat)abstract
    • A new method to generate fingerprints of chemical agents has been introduced in this paper. The method is based on the use of the zero-crossing statistics at fluctuation-enhanced sensing. It is a new version of Ben Kedem's original method based on low-pass filters. To improve computation time and energy efficiency, high-pass filtering is used, and in doing this in the simplest possible way, local zero levels for short-time subwindows are defined and a zero-crossing counting by the use of such windows is carried out. The method turns out to be an effective tool to identify noise processes with different spectra or amplitude distribution, with at least 1000 times less calculation and correspondingly lower energy need than that of the Kedem or the fast Fourier transform methods. We demonstrate the usability of the method by the analysis and recognition of different stochastic processes with similar and different spectra.
  •  
5.
  • Kish, Laszlo B., et al. (författare)
  • Analysis of an Attenuator Artifact in an Experimental Attack by Gunn-Allison-Abbott Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
  • 2015
  • Ingår i: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 14:1, s. 1-8
  • Tidskriftsartikel (refereegranskat)abstract
    • A recent paper by Gunn-Allison-Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its builtin current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.
  •  
6.
  • Kish, Laszlo B., et al. (författare)
  • Comments On "A New Transient Attack On The Kish Key Distribution System"
  • 2016
  • Ingår i: METROLOGY AND MEASUREMENT SYSTEMS. - : Walter de Gruyter GmbH. - 0860-8229 .- 2300-1941. ; 23:3, s. 321-331
  • Tidskriftsartikel (refereegranskat)abstract
    • A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
  •  
7.
  • Kish, Laszlo B., et al. (författare)
  • Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
  • 2014
  • Ingår i: Entropy. - : MDPI AG. - 1099-4300. ; 16:10, s. 5223-5231
  • Tidskriftsartikel (refereegranskat)abstract
    • We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve's information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.
  •  
8.
  • Kish, Laszlo B., et al. (författare)
  • Enhanced Usage of Keys Obtained by Physical, Unconditionally Secure Distributions
  • 2015
  • Ingår i: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 14:2, s. 1-3
  • Tidskriftsartikel (refereegranskat)abstract
    • Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. Here, we outline a protocol that reduces this speed problem and allows almost-one-time-pad based communication with an unconditionally secure physical key of finite length. The physical, unconditionally secure key is not used for data encryption but is employed in order to generate and share a new software-based key without any known-plain-text component. The software-only-based key distribution is then changed from computationally secure to unconditionally secure, because the communicated key-exchange data (algorithm parameters, one-way functions of random numbers, etc.) are encrypted in an unconditionally secure way with a one-time-pad. For practical applications, this combined physical/software key distribution based communication looks favorable compared to the software-only and physical-only key distribution based communication whenever the speed of the physical key distribution is much lower than that of the software-based key distribution. A mathematical security proof of this new scheme remains an open problem.
  •  
9.
  • Kish, Laszlo B., et al. (författare)
  • Fluctuation-Enhanced Sensing for Biological Agent Detection and Identification
  • 2011
  • Ingår i: IEEE transactions on nanotechnology. - 1536-125X .- 1941-0085. ; 10:6, s. 1238-1242
  • Tidskriftsartikel (refereegranskat)abstract
    • We survey and show our earlier results about three different ways of fluctuation-enhanced sensing of bio agent, 1) the phage-based method for bacterium detection published earlier; 2) sensing and evaluating the odors of microbes; and 3) spectral and amplitude distribution analysis of noise in light scattering to identify spores based on their diffusion coefficient.
  •  
10.
  • Kish, Laszlo B, et al. (författare)
  • Information, Noise, and Energy Dissipation: : Laws, Limits, and Applications
  • 2017
  • Ingår i: Molecular Architectonics. - Cham : Springer. - 9783319570952 ; , s. 27-44
  • Bokkapitel (refereegranskat)abstract
    • This chapter addresses various subjects, including some open questions related to energy dissipation, information, and noise, that are relevant for nano- and molecular electronics. The object is to give a brief and coherent presentation of the results of a number of recent studies of ours
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 21

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy