An efficient group synchronization of chaos-tuned neural networks for exchange of common secret key
暂无分享,去创建一个
[1] Muhammad Saadi,et al. An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT , 2021, Wireless Personal Communications.
[2] Arindam Sarkar,et al. Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning , 2021, Neural Processing Letters.
[3] Arindam Sarkar,et al. Secure exchange of information using artificial intelligence and chaotic system guided neural synchronization , 2021, Multimedia Tools and Applications.
[4] Dowon Hong,et al. Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems , 2021, Secur. Commun. Networks.
[5] Osama S. Faragallah,et al. Efficient chaotic-based image cryptosystem with different modes of operation , 2020, Multimedia Tools and Applications.
[6] Dheerendra Mishra,et al. Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system , 2020, Multimedia Tools and Applications.
[7] Khalid Zenkouar,et al. A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory , 2020, Multimedia Tools and Applications.
[8] Sunil Karforma,et al. Neural soft computing based secured transmission of intraoral gingivitis image in e-health care , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[9] Arindam Sarkar,et al. Multilayer neural network synchronized secured session key based encryption in wireless communication , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[10] Cheng-Chew Lim,et al. Cluster Synchronization for Neutral Stochastic Delay Networks via Intermittent Adaptive Control , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[11] Mattia Frasca,et al. A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation , 2019, Chaos, Solitons & Fractals.
[12] Zhen Ni,et al. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[13] Marcin Niemiec,et al. Error correction in quantum cryptography based on artificial neural networks , 2018, Quantum Inf. Process..
[14] Xiaofeng Liao,et al. Event-triggered synchronization for reaction–diffusion complex networks via random sampling , 2018 .
[15] Jia Wang,et al. Multivariate Cryptography Based on Clipped Hopfield Neural Network , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[16] Jing Zhang,et al. Chaotic multimedia stream cipher scheme based on true random sequence combined with tree parity machine , 2017, Multimedia Tools and Applications.
[17] Hector Gomez,et al. A 65 nm CMOS key establishment core based on tree parity machines , 2017, Integr..
[18] Lingfeng Liu,et al. Pseudorandom bit generator based on non-stationary logistic maps , 2016, IET Inf. Secur..
[19] Tao Dong,et al. Event-triggered synchronization strategy for complex dynamical networks with the Markovian switching topologies , 2016, Neural Networks.
[20] Pagavathigounder Balasubramaniam,et al. Synchronization of chaotic systems using feedback controller: An application to Diffie–Hellman key exchange protocol and ElGamal public key cryptosystem , 2014 .
[21] Ryszard Kozera,et al. DISTRIBUTION OF THE TREE PARITY MACHINE SYNCHRONIZATION TIME , 2013 .
[22] Tingwen Huang,et al. Approach to design neural cryptography: a generalized architecture and a heuristic rule. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[23] W. Kinzel,et al. Genetic attack on neural cryptography. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] W. Kinzel,et al. Cryptography based on neural networks—analytical results , 2002, cond-mat/0202350.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] Chee Peng Lim,et al. Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[27] Mohammad Eftekhari,et al. A Diffie–Hellman key exchange protocol using matrices over noncommutative rings , 2012, Groups Complex. Cryptol..
[28] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[29] Thomas M. Cover,et al. Elements of Information Theory , 2005 .