The Kish cypher the story of KLJN for unconditional security
This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Singapore
World Scientific Pub.
2017
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.A25 K57 2017 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 52186 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014131.0 | ||
| 008 | 221104 2017 si a abhi 001 0 eng d | ||
| 020 | |a 9789814449458 (hardback) | ||
| 039 | 9 | |a 202211041222 |b VLOAD |c 202001201543 |d johari |y 201904021107 |z shahrim | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b K57 2017 | ||
| 100 | 1 | |a Kish, Laszlo B., |e author. | |
| 245 | 1 | 4 | |a The Kish cypher |b the story of KLJN for unconditional security |c Laszlo B. Kish. |
| 264 | 1 | |a Singapore |b World Scientific Pub. |c 2017 | |
| 300 | |a xx, 439 pages |b illustrations (some color) |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle - an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. The contents of this text address both layman and expert levels of understanding. | ||
| 592 | |a KE 0010052019 |b 19/09/2019 |c RM 633.18 |h Kaca Enigma | ||
| 600 | 1 | 0 | |a Kish, Laszlo B. |
| 650 | 0 | |a Computer security |x Technological innovations. | |
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Thermodynamic cycles. | |
| 999 | |a vtls000063062 |c 52186 |d 52186 | ||


