SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Kish Laszlo) "

Search: WFRF:(Kish Laszlo)

  • Result 1-25 of 48
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Kish, Eszter A., et al. (author)
  • Lognormal distribution of firing time and rate from a single neuron?
  • 2015
  • In: Cognitive Neurodynamics. - : Springer Science and Business Media LLC. - 1871-4080 .- 1871-4099. ; 9:4, s. 459-462
  • Journal article (peer-reviewed)abstract
    • Even a single neuron may be able to produce significant lognormal features in its firing statistics due to noise in the charging ion current. A mathematical scheme introduced in advanced nanotechnology is relevant for the analysis of this mechanism in the simplest case, the integrate-and-fire model with white noise in the charging ion current.
  •  
2.
  • Kish, Lazar L, et al. (author)
  • Log-normal distribution of single molecule fluorescence bursts in micro/nano-fluidic channels
  • 2011
  • In: Applied Physics Letters. - : AIP Publishing. - 0003-6951 .- 1077-3118. ; 99:14, s. 143121-
  • Journal article (peer-reviewed)abstract
    • The width and shape of photon burst histograms pose significant limitations to the identification of single molecules in micro/nano-fluidic channels, and the nature of these histograms is not fully understood, To reach a deeper understanding, we performed computer simulations based on a Gaussian beam intensity profile with various fluidic channel diameters and assuming (1) a deterministic (noise-free) case, (2) photon emission/absorption noise, and (3) photon noise with diffusion. Photon noise in narrow channels yields a Gaussian burst distribution while additional strong diffusion produces skewed histograms. We use the fluctuating residence time picture Soderlund et al., Phys. Rev, Lett, 80, 2386 (1998)1 and conclude that the skewness of the photon number distribution is caused by the longitudinal diffusive component of the motion of the molecules as they traverse the laser beam. In the case of strong diffusion in narrow channels, this effect leads to a log-normal distribution. We show that the same effect can transform the separate peaks of the photon burst histograms of multiple molecule mixtures into a single log-normal shape.
  •  
3.
  • Kish, Lazar L., et al. (author)
  • Optimum drift velocity for single molecule fluorescence bursts in micro/nano-fluidic channels
  • 2012
  • In: Applied Physics Letters. - : AIP Publishing. - 0003-6951 .- 1077-3118. ; 101:4, s. 043120-
  • Journal article (peer-reviewed)abstract
    • Photonic burst histograms can be used to identify single protein molecules in micro/nano-fluidic channels provided the width of the histogram is narrow. Photonic shot noise and residence time fluctuations, caused by longitudinal diffusion, are the major sources of the histogram width. This paper is a sequel to an earlier one of ours [L. L. Kish et al., Appl. Phys. Lett. 99, 143121 (2011)] and demonstrates that, for a given diffusion coefficient, an increase of the drift velocity enhances the relative shot noise and decreases the relative residence time fluctuations. This leads to an optimum drift velocity that minimizes the histogram width and maximizes the ability to identify single molecules, which is an important result for applications.
  •  
4.
  • Aroutiounian, Vladimir M., et al. (author)
  • Noise spectroscopy of gas sensors
  • 2008
  • In: IEEE Sensors Journal. - 1530-437X .- 1558-1748. ; 8:5-6, s. 786-790
  • Journal article (peer-reviewed)abstract
    • We study current-voltages and low-frequency noise characteristics of the metal-porous silicon-silicon single crystal-metal structure with 50% and 73% porosity of porous silicon. The study is performed in dry air and in a mix of dry air with carbon monoxide of different concentrations. The Hooge noise parameter alpha(H) and the parameter gamma in the frequency dependence of the noise voltage spectral density S-U (f) were determined from experimental data. High sensitivity of spectral dependence of noise to gas concentration allows offering powerful method for determination of gas concentration in the air or environment.
  •  
5.
  • Chen, Hsien-Pu, et al. (author)
  • Do Electromagnetic Waves Exist in a Short Cable at Low Frequencies? : What Does Physics Say?
  • 2014
  • In: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 13:2, s. 1450016-
  • Journal article (peer-reviewed)abstract
    • We refute a physical model, recently proposed by Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf], to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. Their model, and its theoretical underpinnings, is found to be fundamentally flawed because their assumption of electromagnetic waves violates not only the wave equation but also the second law of thermodynamics, the principle of detailed balance, Boltzmann's energy equipartition theorem, and Planck's formula by implying infinitely strong blackbody radiation. We deduce the correct mathematical model of the GAA scheme, which is based on impedances at the quasi-static limit. Mathematical analysis and simulation results confirm our approach and prove that GAA's experimental interpretation is incorrect too.
  •  
6.
  • Chen, Hsien-Pu, et al. (author)
  • On The "Cracking" Scheme in The Paper "A Directional Coupler Attack Against the Kish Key Distribution System" by Gunn, Allison And Abbott
  • 2014
  • In: METROLOGY AND MEASUREMENT SYSTEMS. - : Polish Academy of Sciences Chancellery. - 0860-8229 .- 2300-1941. ; 21:3, s. 389-400
  • Journal article (peer-reviewed)abstract
    • Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA's mathematical model is unphysical. Here we analyze GAA's cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA's claim to be experimentally capable of distinguishing-using statistics over a few correlation times only-the distributions of two Gaussian noises with a relative variance difference of less than 10(-8). Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA's assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the time-derivative nature of GAA's scheme which tends to enhance all of these artifacts.
  •  
7.
  •  
8.
  •  
9.
  •  
10.
  • Frenning, Göran, et al. (author)
  • Spectral analysis of force fluctuations during probe penetration into cohesive powders
  • 2008
  • In: Powder Technology. - : Elsevier BV. - 0032-5910 .- 1873-328X. ; 187:1, s. 62-67
  • Journal article (peer-reviewed)abstract
    • We investigate force fluctuations during probe penetration into cohesive powders consisting of ∼5 μm lactose particles with varying surfaceproperties prepared by spray drying. The results obtained for the more cohesive powders were remarkably similar to those previously reported fororders of magnitude larger noncohesive particles. For the less cohesive powders, the spectral densities were instead found to exhibit two distinctpower-law regions. Furthermore, the spectra were found to be independent of the geometry of the penetrating probe and dimensions of the diecavity. These findings suggest that the response is dominated by particle aggregate or agglomerate movement for the more cohesive powders,whereas the behaviour of the less cohesive ones is consistent with a response dominated by relatively weak force chains, with the fluctuations resulting from the recurring creation and collapse of jammed states being damped for length scales N0.1 mm.
  •  
11.
  • Fulati, Alimujiang (author)
  • Mechanical Characterization and Electrochemical Sensor Applications of Zinc Oxide Nanostructures
  • 2010
  • Doctoral thesis (other academic/artistic)abstract
    • Nanotechnology is emerging to be one of the most important scientific disciplines that physics, chemistry and biology truly overlap with each other. Over the last two decades science and technology have witnessed tremendous improvement in the hope of unveiling the true secrets of the nature in molecular or atomic level. Today, the regime of nanometer is truly reached.ZnO is a promising material due to the wide direct band gap (3.37 eV) and the room temperature large exciton binding energy (60 meV). Recent studies have shown considerable attraction towards ZnO nanostructures, particularly on one-dimensional ZnO nanorods, nanowires, and nanotubes due to the fact that, for a large number of applications, shape and size of the ZnO nanostructures play a vital role for the performance of the devices. The noncentrosymmetric property of ZnO makes it an ideal piezoelectric material for nanomechanical devices. Thus, mechanical characterization of one dimensional ZnO nanostructures including strength, toughness, stiffness, hardness, and adhesion to the substrate is very important for the reliability and efficient operation of piezoelectric ZnO nanodevices. Moreover, owing to the large effective surface area with high surface-to-volume ratio, the surface of one dimensional ZnO nanowires, nanorods, and nanotubes is very sensitive to the changes in surface chemistry and hence can be utilized to fabricate highly sensitive ZnO electrochemical sensors.This thesis studies mechanical properties and electrochemical sensor applications of ZnO nanostructures.The first part of the thesis deals with mechanical characterization of vertically grown ZnO nanorods and nanotubes including buckling, mechanical instability, and bending flexibility. In paper I, we have investigated mechanical instability and buckling characterization of vertically aligned single-crystal ZnO nanorods grown on Si, SiC, and sapphire substrates by vapor-liquid-solid (VLS) method. The critical loads for the ZnO nanorods grown on Si, SiC, and sapphire were measured and the corresponding buckling and adhesion energies were calculated. It was found that the nanorods grown on SiC substrate have less residual stresses and are more stable than the nanorods grown on Si and sapphire substrates.Paper II investigates nanomechanical tests of bending flexibility, kinking, and buckling failure characterization of vertically aligned single crystal ZnO nanorods/nanowires grown by VLS and aqueous chemical growth (ACG) methods. We observed that the loading and unloading behaviors during the bending test of the as-grown samples were highly symmetrical and the highest point on the bending curves and the first inflection and critical point were very close. The results also show that the elasticity of the ZnO single crystal is approximately linear up to the first inflection point and is independent of the growth method.In Paper III, we quantitatively investigated the buckling and the elastic stability of vertically well aligned ZnO nanorods and ZnO nanotubes grown on Si substrate by nanoindentation technique. We found that the critical load for the nanorods was five times larger than the critical load for nanotubes. On the contrary, the flexibility for nanotubes was five times larger than nanorods. The discovery of high flexibility for nanotubes and high elasticity for nanorods can be utilized for designing efficient piezoelectric nanodevices.The second part of this thesis investigates electrochemical sensor applications of ZnO nanorods, nanotubes , and nanoporous material.In paper IV, we utilized functionalized ZnO nanorods on the tip of a borosilicate glass capillary coated with ionophore-membrane to construct intracellular Ca2+ selective sensor. The sensor exhibited a Ca2+-dependent electrochemical potential difference and the response was linear over a large dynamic concentration range, which enabled this sensor to measure Ca2+ concentrations in human adipocytes or in frog oocytes. The results were consistent with the values of Ca2+ concentrations reported in the literature.In paper V, ZnO nanotubes and nanorods were used to create pH sensor devices. The developed ZnO pH sensors display good reproducibility, repeatability, and long-term stability. The ZnO pH sensors exhibited a pH-dependent electrochemical potential difference over a large dynamic pH range. We found that the ZnO nanotubes provide sensitivity as high as twice that of the ZnO nanorods. The possible reasons of enhanced sensitivity were explained.Paper VI investigates an improved potentiometric intracellular glucose biosensor based on the immobilization of glucose oxidase on the ZnO nanoporous material. We demonstrated that using ZnO nanoporous material as a matrix material for enzyme immobilization improves the sensitivity of the biosensor as compared to using ZnO nanorods. In addition, the fabrication method of the intracellular biosensor was simple and excellent performance in sensitivity, stability, selectivity, reproducibility, and anti-interference was achieved.
  •  
12.
  • Gingl, Zoltan, et al. (author)
  • Fluctuation-Enhanced Sensing With Zero-Crossing Analysis for High-Speed and Low-Power Applications
  • 2010
  • In: IEEE Sensors Journal. - 1530-437X .- 1558-1748. ; 10:3, s. 492-497
  • Journal article (peer-reviewed)abstract
    • A new method to generate fingerprints of chemical agents has been introduced in this paper. The method is based on the use of the zero-crossing statistics at fluctuation-enhanced sensing. It is a new version of Ben Kedem's original method based on low-pass filters. To improve computation time and energy efficiency, high-pass filtering is used, and in doing this in the simplest possible way, local zero levels for short-time subwindows are defined and a zero-crossing counting by the use of such windows is carried out. The method turns out to be an effective tool to identify noise processes with different spectra or amplitude distribution, with at least 1000 times less calculation and correspondingly lower energy need than that of the Kedem or the fast Fourier transform methods. We demonstrate the usability of the method by the analysis and recognition of different stochastic processes with similar and different spectra.
  •  
13.
  •  
14.
  • Hammerstein, Peter, 1971- (author)
  • Stochastic Resonance and Noise-Assisted Signal Transfer : On Coupling Effects of Stochastic Resonators and Spectral Optimization of Fluctuations in Random Network Switches
  • 2004
  • Doctoral thesis (other academic/artistic)abstract
    • Recent research shows that noise or random fluctuations must not always be destructive in Nature by degrading system performance. On the contrary, in nonlinear systems they can synchronize systems or enhance the quality of signal transmission. The latter possibility is reported in the thesis.The phenomenon of stochastic resonance (SR) is presented and illustrated by an example of a ferromagnetically coupled spin chain, described by the Glauber's stochastic Ising spin model. It is demonstrated that an optimal strength of the next-neighbor interaction is able to improve the SR-effect. A similar mechanism has further been studied on the stochastic nonlinear dynamics of a ferromagnetic stripe domain in an inhomogeneous thin film. SR and its dependence on the domain stiffness, which is due to the exchange interaction, are presented. Experimental parameters for potential verification on Bi-doped epitaxial garnet-ferrite films are proposed. Further-on, a nonlinear model of a junction in neuronal and road structures is studied using various types of noise (stochastic processes) to generate the incoming traffic. It is shown that random fluctuations are able to enhance signal transmission, whereby the zero crossings of colored (1/fk) Gaussian noise is superior to Poissonian noise and, in certain cases, to deterministic, periodic traffic too. Optimal traffic for k ≈ 1 has been found. In case of Gaussian 1/fk noise modulated periodic input, noise-assisted traffic can be observed as well and demonstrate how random fluctuations can enhance the signal traffic efficiency in a network. The effect of an optimal k has finally been applied to a data package network switch, whereby a stochastic data scheduling algorithm is proposed and investigated numerically and analytically.
  •  
15.
  • Kish, Laszlo B., et al. (author)
  • Analysis of an Attenuator Artifact in an Experimental Attack by Gunn-Allison-Abbott Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
  • 2015
  • In: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 14:1, s. 1-8
  • Journal article (peer-reviewed)abstract
    • A recent paper by Gunn-Allison-Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its builtin current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.
  •  
16.
  • Kish, Laszlo B., et al. (author)
  • Comments On "A New Transient Attack On The Kish Key Distribution System"
  • 2016
  • In: METROLOGY AND MEASUREMENT SYSTEMS. - : Walter de Gruyter GmbH. - 0860-8229 .- 2300-1941. ; 23:3, s. 321-331
  • Journal article (peer-reviewed)abstract
    • A recent IEEE Access Paper by Gunn, Allison and Abbott (GAA) proposed a new transient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. The attack is valid, but it is easy to build a defense for the KLJN system. Here we note that GAA's paper contains several invalid statements regarding security measures and the continuity of functions in classical physics. These deficiencies are clarified in our present paper, wherein we also emphasize that a new version of the KLJN system is immune against all existing attacks, including the one by GAA.
  •  
17.
  • Kish, Laszlo B., et al. (author)
  • Critical Analysis of the Bennett-Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law-Johnson-Noise Scheme
  • 2013
  • In: PLOS ONE. - : Public Library of Science (PLoS). - 1932-6203. ; 8:12, s. e81810-
  • Journal article (peer-reviewed)abstract
    • Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.
  •  
18.
  • Kish, Laszlo B., et al. (author)
  • Does Information Have Mass?
  • 2013
  • In: Proceedings of the IEEE. - 0018-9219 .- 1558-2256. ; 101:9, s. 1895-1899
  • Journal article (other academic/artistic)abstract
    • This article addresses the fundamental question of minimum mass related to a bit of information from the angles of quantum physics and special relativity. The results indicate that there are different answers depending on the physical situation, and sometimes the mass can even be negative. It tends to be skeptical about the earlier mass estimations, mentioned above, because the results indicate that the electron's mass does not play a role in any one of them. Finally, in a seemingly related but actually different and independent context of measured inaccuracies of the gravitation constant, it refers to experiments on the weight transient of memory devices after information writing and erasure.
  •  
19.
  • Kish, Laszlo Bela, et al. (author)
  • Electrical Maxwell Demon and Szilard Engine Utilizing Johnson Noise, Measurement, Logic and Control
  • 2012
  • In: PLOS ONE. - : Public Library of Science (PLoS). - 1932-6203. ; 7:10, s. e46800-
  • Journal article (peer-reviewed)abstract
    • We introduce a purely electrical version of Maxwell's demon which does not involve mechanically moving parts such as trapdoors, etc. It consists of a capacitor, resistors, amplifiers, logic circuitry and electronically controlled switches and uses thermal noise in resistors (Johnson noise) to pump heat. The only types of energy of importance in this demon are electrical energy and heat. We also demonstrate an entirely electrical version of Szilard's engine, i.e., an information-controlled device that can produce work by employing thermal fluctuations. The only moving part is a piston that executes work, and the engine has purely electronic controls and it is free of the major weakness of the original Szilard engine in not requiring removal and repositioning the piston at the end of the cycle. For both devices, the energy dissipation in the memory and other binary informatics components are insignificant compared to the exponentially large energy dissipation in the analog part responsible for creating new information by measurement and decision. This result contradicts the view that the energy dissipation in the memory during erasure is the most essential dissipation process in a demon. Nevertheless the dissipation in the memory and information processing parts is sufficient to secure the Second Law of Thermodynamics.
  •  
20.
  • Kish, Laszlo B., et al. (author)
  • Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System
  • 2014
  • In: Entropy. - : MDPI AG. - 1099-4300. ; 16:10, s. 5223-5231
  • Journal article (peer-reviewed)abstract
    • We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve's information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.
  •  
21.
  • Kish, Laszlo B., et al. (author)
  • Enhanced Usage of Keys Obtained by Physical, Unconditionally Secure Distributions
  • 2015
  • In: Fluctuation and Noise Letters. - 0219-4775 .- 1793-6780. ; 14:2, s. 1-3
  • Journal article (peer-reviewed)abstract
    • Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. Here, we outline a protocol that reduces this speed problem and allows almost-one-time-pad based communication with an unconditionally secure physical key of finite length. The physical, unconditionally secure key is not used for data encryption but is employed in order to generate and share a new software-based key without any known-plain-text component. The software-only-based key distribution is then changed from computationally secure to unconditionally secure, because the communicated key-exchange data (algorithm parameters, one-way functions of random numbers, etc.) are encrypted in an unconditionally secure way with a one-time-pad. For practical applications, this combined physical/software key distribution based communication looks favorable compared to the software-only and physical-only key distribution based communication whenever the speed of the physical key distribution is much lower than that of the software-based key distribution. A mathematical security proof of this new scheme remains an open problem.
  •  
22.
  • Kish, Laszlo B., et al. (author)
  • Fluctuation-Enhanced Sensing for Biological Agent Detection and Identification
  • 2011
  • In: IEEE transactions on nanotechnology. - 1536-125X .- 1941-0085. ; 10:6, s. 1238-1242
  • Journal article (peer-reviewed)abstract
    • We survey and show our earlier results about three different ways of fluctuation-enhanced sensing of bio agent, 1) the phage-based method for bacterium detection published earlier; 2) sensing and evaluating the odors of microbes; and 3) spectral and amplitude distribution analysis of noise in light scattering to identify spores based on their diffusion coefficient.
  •  
23.
  • Kish, Laszlo B, et al. (author)
  • Information, Noise, and Energy Dissipation: : Laws, Limits, and Applications
  • 2017
  • In: Molecular Architectonics. - Cham : Springer. - 9783319570952 ; , s. 27-44
  • Book chapter (peer-reviewed)abstract
    • This chapter addresses various subjects, including some open questions related to energy dissipation, information, and noise, that are relevant for nano- and molecular electronics. The object is to give a brief and coherent presentation of the results of a number of recent studies of ours
  •  
24.
  •  
25.
  • Kish, Laszlo B., et al. (author)
  • On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator
  • 2014
  • In: Quantum Information Processing. - : Springer Science and Business Media LLC. - 1570-0755 .- 1573-1332. ; 13:10, s. 2213-2219
  • Journal article (peer-reviewed)abstract
    • A simple and general proof is given for the information theoretic (unconditional) security of the Kirchhoff-law-Johnson-noise key exchange system under practical conditions. The unconditional security for ideal circumstances, which is based on the second law of thermodynamics, is found to prevail even under slightly non-ideal conditions. This security level is guaranteed by the continuity of functions describing classical physical linear, as well as stable non-linear, systems. Even without privacy amplification, Eve's probability for successful bit guessing is found to converge toward 0.5-i.e., the perfect security level-when ideal conditions are approached.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-25 of 48

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view