Neural synchronization based secret key exchange over public channels: A survey
暂无分享,去创建一个
Sandip Chakraborty | Jiban Dalal | Bikramjit Sarkar | Debaprasad Mukherjee | Sandip Chakraborty | B. Sarkar | D. Mukherjee | Jiban Dalal
[1] Kinouchi,et al. Equivalence between learning in noisy perceptrons and tree committee machines. , 1996, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[2] Tingwen Huang,et al. Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[3] Chuandong Li,et al. Neural Information Processing , 2012, Lecture Notes in Computer Science.
[4] Advances in Solid State Physics , 2009 .
[5] Andreas Ruttor,et al. Successful attack on permutation-parity-machine-based neural cryptography. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Wolfgang Kinzel,et al. Public channel cryptography by synchronization of neural networks and chaotic maps. , 2003, Physical review letters.
[7] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[8] Abhinav Tiwari,et al. An Empirical Investigation of Using ANN Based N-State Sequential Machine and Chaotic Neural Network in the Field of Cryptography , 2012 .
[9] Tai-Wen Yue,et al. A neural network approach for visual cryptography , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[10] Xiaofeng Liao,et al. A Digital Image Encryption Algorithm Based on Hyper-chaotic Cellular Neural Network , 2009, Fundam. Informaticae.
[11] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[14] Jinde Cao,et al. Cryptography based on delayed chaotic neural networks , 2006 .
[15] Jinde Cao,et al. Adaptive synchronization and lag synchronization of uncertain dynamical system with time delay based on parameter identification , 2007 .
[16] Yong Wang,et al. Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.
[17] Pravin Revankar,et al. Neural Synchronization with Queries , 2010, 2010 International Conference on Signal Acquisition and Processing.
[18] Yong Wang,et al. Parallel hash function construction based on coupled map lattices , 2011 .
[19] Sorin A. Huss,et al. Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[20] Wolfgang Kinzel,et al. Cooperating attackers in neural cryptography. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[21] Wolfgang Kinzel,et al. Cryptography based on neural networks—analytical results , 2002 .
[22] Xuerong Mao,et al. Stability of stochastic delay neural networks , 2001, J. Frankl. Inst..
[23] Andreas Ruttor,et al. Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] Arindam Sarkar,et al. An adaptive neural network guided secret key based encryption through recursive positional modulo-2 substitution for online wireless communication (ANNRPMS) , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[25] Hazem M. Abbas,et al. Security analysis of neural cryptography implementation , 2013, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).
[26] Hazem M. Abbas,et al. On the Improvement of Neural Cryptography Using Erroneous Transmitted Information With Error Prediction , 2010, IEEE Transactions on Neural Networks.
[27] Wolfgang Kinzel,et al. Neural cryptography with queries , 2005 .
[28] Louis M Pecora,et al. Synchronization of chaotic systems. , 2015, Chaos.
[29] Wolfgang Kinzel,et al. Mutual learning in a tree parity machine and its application to cryptography. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[30] Yu Huang,et al. Chaotic Maps: Dynamics, Fractals, and Rapid Fluctuations , 2011, Chaotic Maps: Dynamics, Fractals, and Rapid Fluctuations.
[31] Andreas Ruttor,et al. Neural cryptography with feedback. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[32] Emilio Del-Moral-Hernandez,et al. Chaotic Neural Networks , 2009, Encyclopedia of Artificial Intelligence.
[33] Karl-Heinz Zimmermann,et al. Permutation parity machines for neural synchronization , 2009 .
[34] Hazem M. Abbas,et al. Group key exchange using neural cryptography with binary trees , 2011, 2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE).
[35] W. Kinzel,et al. Secure exchange of information by synchronization of neural networks , 2002 .
[36] Karl-Heinz Zimmermann,et al. Permutation parity machines for neural cryptography. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[37] Wolfgang Kinzel,et al. Interacting Neural Networks and Cryptography , 2002 .
[39] Tingwen Huang,et al. Two-layer tree-connected feed-forward neural network model for neural cryptography , 2013, Physical Review E.