Skip to main content

Showing 1–3 of 3 results for author: Horvath, T

Searching in archive physics. Search in all archives.
.
  1. arXiv:1007.5282  [pdf

    physics.data-an cs.IT physics.gen-ph

    Noise-based deterministic logic and computing: a brief survey

    Authors: Laszlo B. Kish, Sunil P. Khatri, Sergey M. Bezrukov, Ferdinand Peper, Zoltan Gingl, Tamas Horvath

    Abstract: A short survey is provided about our recent explorations of the young topic of noise-based logic. After outlining the motivation behind noise-based computation schemes, we present a short summary of our ongoing efforts in the introduction, development and design of several noise-based deterministic multivalued logic schemes and elements. In particular, we describe classical, instantaneous, continu… ▽ More

    Submitted 29 July, 2010; originally announced July 2010.

    Comments: Invited paper

    Journal ref: International Journal of Unconventional Computing 7 (2011 February) 101-113

  2. arXiv:1005.1560  [pdf

    cs.IT physics.gen-ph

    Computation using Noise-based Logic: Efficient String Verification over a Slow Communication Channel

    Authors: Laszlo B. Kish, Sunil Khatri, Tamas Horvath

    Abstract: Utilizing the hyperspace of noise-based logic, we show two string verification methods with low communication complexity. One of them is based on continuum noise-based logic. The other one utilizes noise-based logic with random telegraph signals where a mathematical analysis of the error probability is also given. The last operation can also be interpreted as computing universal hash functions wi… ▽ More

    Submitted 11 November, 2010; v1 submitted 10 May, 2010; originally announced May 2010.

    Comments: Accepted for publication in European Journal of Physics B (November 10, 2010)

    Journal ref: Eur. Phys. J. B 79, 85-90 (2011)

  3. arXiv:0903.2071  [pdf

    physics.gen-ph cs.CR physics.class-ph

    Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange

    Authors: Laszlo B. Kish, Tamas Horvath

    Abstract: We critically analyze the results and claims in [Physics Letters A 373 (2009) 901-904]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by "multiple reflections". Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used… ▽ More

    Submitted 29 June, 2009; v1 submitted 12 March, 2009; originally announced March 2009.

    Comments: Accepted for publication in Physics Letters A on May 29, 2009. In the present version, DOI and acceptance info is added in the pdf file, too

    Journal ref: Physics Letters A 373 (2009) 2858-2868