On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
暂无分享,去创建一个
[1] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[2] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Kurt Hornik,et al. Multilayer feedforward networks are universal approximators , 1989, Neural Networks.
[5] George Cybenko,et al. Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..
[6] Averill M. Law,et al. Simulation Modeling and Analysis , 1982 .
[7] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[8] Vasilios Zorkadis,et al. On Applying Multilayer Perceptron Learning Properties to (Pseudo) Random Number Generation and Evaluation , 1998, Neural Parallel Sci. Comput..
[9] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[10] Ed Dawson,et al. A computer package for measuring the strength of encryption algorithms , 1994, Comput. Secur..
[11] Charles P. Pfleeger,et al. Security in computing , 1988 .
[12] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[13] Giovanni Di Crescenzo,et al. Contemporary cryptology , 2005, Advanced courses in mathematics : CRM Barcelona.
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[16] Dieter Gollmann,et al. Authentication services in distributed systems , 1993, Comput. Secur..