FLUCTUATION AND NOISE EXPLOITATION LABORATORY |
||
|
Dept. of Electrical and Computer Engineering, Texas A&M University |
|
Other names of the
Kirchhoff's-law-Johnson-noise (KLJN) secure key
distribution
While we prefer the name KLJN particularly because now about 10 different "Kish" types of KLJN schemes exist, for identification purposes, we list a few other names: Other names of the original scheme - Kish key distribution, KKD (Gunn-Allison-Abbott in multiple papers 2013- ) - Kish cypher (Derek Abbott and Wikipedia 2008-2013; and the new book triggered by the Wikipedia fights) - Classical key exchange scheme based on Johnson noise (Pao-Lo Liu, 2009) - Kish's cipher (Jason Palmer, New Scientist, 2007) - Kish's encryption scheme (Bruce Schneier, Schneier on security, 2005-2006) Names of other KLJN protocols with enhanced or special performance - RRRT-KLJN (random-resistor-random-temperature KLJN) - VMG-KLJN (Vadai-Mingesz-Gingl KLJN) - iKLJN (intelligent KLJN) - MKLJN (multiple KLJN) - KKLJN (keyed KLJN) - iMKLJN (intelligent-multiple KLJN) - iKKLJN (intelligent-keyed KLJN) - KMKLJN (keyed-multiple KLJN) - iKMKLJN (intelligent-keyed-multiple KLJN) Note, there are yet other types, such as circulator-based active KLJN schemes and Pao-Lo Liu's software emulation KLJN scheme, etc. Back to the homepage of KLJN |
|
FNEL HOME | TAMU HOME | TAMU E.E. DEPT. | TAMU IEEE | TAMU LIBRARY |
Departmentof Electrical
Engineering, Texas A&M University |