An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key

[1]  Muhammad Saadi,et al.  An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT , 2021, Wireless Personal Communications.

[2]  Arindam Sarkar,et al.  Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning , 2021, Neural Processing Letters.

[3]  Arindam Sarkar,et al.  Secure exchange of information using artificial intelligence and chaotic system guided neural synchronization , 2021, Multimedia Tools and Applications.

[4]  Dowon Hong,et al.  Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems , 2021, Secur. Commun. Networks.

[5]  Osama S. Faragallah,et al.  Efficient chaotic-based image cryptosystem with different modes of operation , 2020, Multimedia Tools and Applications.

[6]  Dheerendra Mishra,et al.  Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system , 2020, Multimedia Tools and Applications.

[7]  Khalid Zenkouar,et al.  A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory , 2020, Multimedia Tools and Applications.

[8]  Sunil Karforma,et al.  Neural soft computing based secured transmission of intraoral gingivitis image in e-health care , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[9]  Arindam Sarkar,et al.  Multilayer neural network synchronized secured session key based encryption in wireless communication , 2019, Indonesian Journal of Electrical Engineering and Computer Science.

[10]  Cheng-Chew Lim,et al.  Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[11]  Mattia Frasca,et al.  A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation , 2019, Chaos, Solitons & Fractals.

[12]  Zhen Ni,et al.  A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[13]  Marcin Niemiec,et al.  Error correction in quantum cryptography based on artificial neural networks , 2018, Quantum Inf. Process..

[14]  Xiaofeng Liao,et al.  Event-triggered synchronization for reaction–diffusion complex networks via random sampling , 2018 .

[15]  Jia Wang,et al.  Multivariate Cryptography Based on Clipped Hopfield Neural Network , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[16]  Jing Zhang,et al.  Chaotic multimedia stream cipher scheme based on true random sequence combined with tree parity machine , 2017, Multimedia Tools and Applications.

[17]  Hector Gomez,et al.  A 65 nm CMOS key establishment core based on tree parity machines , 2017, Integr..

[18]  Lingfeng Liu,et al.  Pseudorandom bit generator based on non-stationary logistic maps , 2016, IET Inf. Secur..

[19]  Tao Dong,et al.  Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies , 2016, Neural Networks.

[20]  Pagavathigounder Balasubramaniam,et al.  Synchronization of chaotic systems using feedback controller: An application to Diffie–Hellman key exchange protocol and ElGamal public key cryptosystem , 2014 .

[21]  Ryszard Kozera,et al.  DISTRIBUTION OF THE TREE PARITY MACHINE SYNCHRONIZATION TIME , 2013 .

[22]  Tingwen Huang,et al.  Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[23]  W. Kinzel,et al.  Genetic attack on neural cryptography. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  W. Kinzel,et al.  Cryptography based on neural networks—analytical results , 2002, cond-mat/0202350.

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  Chee Peng Lim,et al.  Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[27]  Mohammad Eftekhari,et al.  A Diffie–Hellman key exchange protocol using matrices over noncommutative rings , 2012, Groups Complex. Cryptol..

[28]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[29]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .