2012
DOI: 10.1142/s0219477512500034
|View full text |Cite
|
Sign up to set email alerts
|

New Noise-Based Logic Representations to Avoid Some Problems With Time Complexity

Abstract: Communicated by Zoltan GinglInstantaneous noise-based logic can avoid time-averaging, which implies significant potential for low-power parallel operations in beyond-Moore-law-chips. However, in its random-telegraph-wave representation, the complete uniform superposition (superposition of all N -bit binary numbers) will be zero with high probability, that is, non-zero with exponentially low probability, thus operations with the uniform superposition would require exponential time-complexity. To fix this defici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(55 citation statements)
references
References 8 publications
0
55
0
Order By: Relevance
“…Such a pair of RTWs is called a noise-bit [1][2][3][4][5][6][7]. In this paper, we use the asymmetric scheme [5] of N-bit resolution, where j is the index of the j-th noise bit and k is the number that is represented.…”
Section: The Asymmetric Random Telegraph Wave Based Inbl [5]mentioning
confidence: 99%
“…Such a pair of RTWs is called a noise-bit [1][2][3][4][5][6][7]. In this paper, we use the asymmetric scheme [5] of N-bit resolution, where j is the index of the j-th noise bit and k is the number that is represented.…”
Section: The Asymmetric Random Telegraph Wave Based Inbl [5]mentioning
confidence: 99%
“…Finally, the application of thermal noise for unconventional informatics, namely for noisebased logic and computing [29][30][31][32][33][34][35][36] and the KJLN secure key exchange [37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52], emerged decades later than the corresponding quantum informatics schemes such as quantum computing [53] and quantum encryption [54][55][56].…”
Section: The Klj Secure Key Exchange Protocolmentioning
confidence: 99%
“…It is interesting to note that some "exotic" phenomena, previously thought to belong to the class of "quantum-weirdness", occur and can be utilized also in the noise schemes, for example teleportation/telecloning in KLJN networks [51] and entanglement in noise-based logic [29][30][31][32][33][34][35][36].…”
Section: The Klj Secure Key Exchange Protocolmentioning
confidence: 99%
“…However, in 2005, the Kirchhoff-Law-Johnson-(like)-Noise (KLJN) secure key exchange [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16] scheme was introduced [4] and later it was built and its security demonstrated [7]. These ideas have inspired new concepts also in computing, particularly noise-based logic and computing [17][18][19][20][21][22][23][24], where not the security of data but complexity of data processing has been the issue.…”
Section: The Kirchhoff-law-johnson-(like)-noise (Kljn) Secure Key Excmentioning
confidence: 99%