Threshold Method of Detecting Long-Time TPM Synchronization
暂无分享,去创建一个
[1] Neural synchronization and cryptography , 2006 .
[2] Ryszard Kozera,et al. The evaluation of the TPM synchronization on the basis of their outputs , 2013 .
[3] Wolfgang Kinzel,et al. Mutual learning in a tree parity machine and its application to cryptography. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Janusz Kacprzyk,et al. Advances in Web Intelligence , 2003, Lecture Notes in Computer Science.
[5] Andreas Ruttor,et al. Synchronization of neural networks by mutual learning and its application to cryptography , 2004, NIPS.
[6] W. Kinzel,et al. Secure exchange of information by synchronization of neural networks , 2002 .
[7] Adi Shamir,et al. Analysis of Neural Cryptography , 2002, ASIACRYPT.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[10] Zbigniew Kotulski,et al. On Application of Neural Networks for S-Boxes Design , 2005, AWIC.
[11] David V. Huntsberger,et al. Elements of statistical inference , 1961 .
[12] Wolfgang Kinzel,et al. The Theory of Neural Networks and Cryptography , 2003 .
[13] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[14] M.H. Hassoun,et al. Fundamentals of Artificial Neural Networks , 1996, Proceedings of the IEEE.
[15] Andreas Ruttor,et al. Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[16] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .