The Kish cypher: the story of KLJN for unconditional security
"Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based compet...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
World Scientific Publishing Co. Pte. Ltd.
c2017
|
Schlagworte: | |
Online-Zugang: | FHN01 Volltext |
Zusammenfassung: | "Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. The contents of this text address both layman and expert levels of understanding."--Publisher's website |
Beschreibung: | Title from PDF title page (viewed May 4, 2017) |
Beschreibung: | 1 online resource (460 p.) ill. (some col.) |
ISBN: | 9789814449465 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044639286 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 171120s2017 |||| o||u| ||||||eng d | ||
020 | |a 9789814449465 |c ebook |9 978-981-4449-46-5 | ||
024 | 7 | |a 10.1142/8707 |2 doi | |
035 | |a (ZDB-124-WOP)00008707 | ||
035 | |a (OCoLC)1012703497 | ||
035 | |a (DE-599)BVBBV044639286 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Kish, Laszlo B. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Kish cypher |b the story of KLJN for unconditional security |c Laszlo B. Kish |
264 | 1 | |a Singapore |b World Scientific Publishing Co. Pte. Ltd. |c c2017 | |
300 | |a 1 online resource (460 p.) |b ill. (some col.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from PDF title page (viewed May 4, 2017) | ||
520 | |a "Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. The contents of this text address both layman and expert levels of understanding."--Publisher's website | ||
600 | 1 | 4 | |a Kish, Laszlo B. |
650 | 4 | |a Computer security / Technological innovations | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Public key cryptography | |
650 | 4 | |a Thermodynamic cycles | |
650 | 4 | |a Electronic noise | |
650 | 4 | |a Electronic books | |
856 | 4 | 0 | |u http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc |x Verlag |z URL des Erstveroeffentlichers |3 Volltext |
912 | |a ZDB-124-WOP | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030037259 | ||
966 | e | |u http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc |l FHN01 |p ZDB-124-WOP |q FHN_PDA_WOP |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178057136701440 |
---|---|
any_adam_object | |
author | Kish, Laszlo B. |
author_facet | Kish, Laszlo B. |
author_role | aut |
author_sort | Kish, Laszlo B. |
author_variant | l b k lb lbk |
building | Verbundindex |
bvnumber | BV044639286 |
collection | ZDB-124-WOP |
ctrlnum | (ZDB-124-WOP)00008707 (OCoLC)1012703497 (DE-599)BVBBV044639286 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02595nmm a2200433zc 4500</leader><controlfield tag="001">BV044639286</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">171120s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814449465</subfield><subfield code="c">ebook</subfield><subfield code="9">978-981-4449-46-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1142/8707</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-124-WOP)00008707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1012703497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044639286</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kish, Laszlo B.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Kish cypher</subfield><subfield code="b">the story of KLJN for unconditional security</subfield><subfield code="c">Laszlo B. Kish</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">World Scientific Publishing Co. Pte. Ltd.</subfield><subfield code="c">c2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (460 p.)</subfield><subfield code="b">ill. (some col.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from PDF title page (viewed May 4, 2017)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. The contents of this text address both layman and expert levels of understanding."--Publisher's website</subfield></datafield><datafield tag="600" ind1="1" ind2="4"><subfield code="a">Kish, Laszlo B.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Thermodynamic cycles</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic noise</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic books</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveroeffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-124-WOP</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030037259</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-124-WOP</subfield><subfield code="q">FHN_PDA_WOP</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044639286 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:57:55Z |
institution | BVB |
isbn | 9789814449465 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030037259 |
oclc_num | 1012703497 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | 1 online resource (460 p.) ill. (some col.) |
psigel | ZDB-124-WOP ZDB-124-WOP FHN_PDA_WOP |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | World Scientific Publishing Co. Pte. Ltd. |
record_format | marc |
spelling | Kish, Laszlo B. Verfasser aut The Kish cypher the story of KLJN for unconditional security Laszlo B. Kish Singapore World Scientific Publishing Co. Pte. Ltd. c2017 1 online resource (460 p.) ill. (some col.) txt rdacontent c rdamedia cr rdacarrier Title from PDF title page (viewed May 4, 2017) "Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself. This book clarifies the misinformation behind heated debates on the "Kish Cypher" (the popular but incorrect name for the Kirchhoff–Law–Johnson–Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle — an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost. The contents of this text address both layman and expert levels of understanding."--Publisher's website Kish, Laszlo B. Computer security / Technological innovations Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise Electronic books http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc Verlag URL des Erstveroeffentlichers Volltext |
spellingShingle | Kish, Laszlo B. The Kish cypher the story of KLJN for unconditional security Kish, Laszlo B. Computer security / Technological innovations Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise Electronic books |
title | The Kish cypher the story of KLJN for unconditional security |
title_auth | The Kish cypher the story of KLJN for unconditional security |
title_exact_search | The Kish cypher the story of KLJN for unconditional security |
title_full | The Kish cypher the story of KLJN for unconditional security Laszlo B. Kish |
title_fullStr | The Kish cypher the story of KLJN for unconditional security Laszlo B. Kish |
title_full_unstemmed | The Kish cypher the story of KLJN for unconditional security Laszlo B. Kish |
title_short | The Kish cypher |
title_sort | the kish cypher the story of kljn for unconditional security |
title_sub | the story of KLJN for unconditional security |
topic | Kish, Laszlo B. Computer security / Technological innovations Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise Electronic books |
topic_facet | Kish, Laszlo B. Computer security / Technological innovations Data encryption (Computer science) Public key cryptography Thermodynamic cycles Electronic noise Electronic books |
url | http://www.worldscientific.com/worldscibooks/10.1142/8707#t=toc |
work_keys_str_mv | AT kishlaszlob thekishcypherthestoryofkljnforunconditionalsecurity |