共 14 条
[1]
Generalized privacy amplification
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1995, 41 (06)
:1915-1923
[2]
BERZANSKIS A, 2005, APPL QUANTUM CRYPTOG
[3]
Cho A, 2005, SCIENCE, V309, P2148
[4]
Hao F., 2006, IEE Proc. Inf. Secur., V153, P141, DOI DOI 10.1049/IP-IFS:20060068
[5]
Response to Feng Hao's paper "Kish's key exchange scheme is insecure"'
[J].
FLUCTUATION AND NOISE LETTERS,
2006, 6 (04)
:C37-C41
[6]
Totally secure classical networks with multipoint telecloning (teleportation) of classical bits through loops with Johnson-like noise
[J].
FLUCTUATION AND NOISE LETTERS,
2006, 6 (02)
:C9-C21
[8]
Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security
[J].
FLUCTUATION AND NOISE LETTERS,
2006, 6 (01)
:L57-L63
[9]
KISH LB, PHYSICS0610014
[10]
KISH LB, 2007, P 4 SPIE S FLUCT NOI, V6600, P66003