Search results

Filters

  • Journals

Search results

Number of results: 2
items per page: 25 50 75
Sort by:

Abstract

Products of Gaussian noises often emerge as the result of non-linear detection techniques or as parasitic effects, and their proper handling is important in many practical applications, including fluctuation-enhanced sensing, indoor air or environmental quality monitoring, etc. We use Rice’s random phase oscillator formalism to calculate the power density spectra variance for the product of two Gaussian band-limited white noises with zero-mean and the same bandwidth W. The ensuing noise spectrum is found to decrease linearly from zero frequency to 2W, and it is zero for frequencies greater than 2W. Analogous calculations performed for the square of a single Gaussian noise confirm earlier results. The spectrum at non-zero frequencies, and the variance of the square of a noise, is amplified by a factor two as a consequence of correlation effects between frequency products. Our analytic results are corroborated by computer simulations.
Go to article

Abstract

There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop ‒ i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol ‒ for secure key distribution leads to information theoretic security levels superior to those of today’s quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Go to article

This page uses 'cookies'. Learn more