It's possible to use artificial neuronal networks for secret key derivation. Transneuronal statistical weights of synchronized artificial neuronal networks will be used as a secret key. Proposed algorithm allows to decrease synchronization time meaningfully. Proposed correction rule helps to solve the problem of statistical weights binding while synchronizing artificial neuronal networks
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...
Part 5: Various Aspects of Computer SecurityInternational audienceThe phenomenon of neural networks ...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...
The main options for the formation of a shared secret using synchronized artificial neural networks ...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
The cryptographic key matching can be based on artificial neural network technologies. Kinzel-Kanter...
The synchronization between two neural networks by mutual learning can be used to design the neural ...
In this paper, multilayer neural network synchronized session key based encryption has been proposed...
Any cryptographic system is used to exchange confidential information securely over the public chann...
Part 7: Various Aspects of Computer SecurityInternational audienceTwo neural networks with randomly ...
Neural networks can synchronize by learning from each other. For that purpose they receive common in...
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of crypto...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
In the Kanter’s and Kinsella’s works is proposes the use of two synchronized artificial neural netwo...
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...
Part 5: Various Aspects of Computer SecurityInternational audienceThe phenomenon of neural networks ...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...
The main options for the formation of a shared secret using synchronized artificial neural networks ...
А combined method for forming a cryptographic key is proposed in the article. The proposed combined ...
A connection between the theory of neural networks and cryptography is presented. A new phenomenon, ...
The cryptographic key matching can be based on artificial neural network technologies. Kinzel-Kanter...
The synchronization between two neural networks by mutual learning can be used to design the neural ...
In this paper, multilayer neural network synchronized session key based encryption has been proposed...
Any cryptographic system is used to exchange confidential information securely over the public chann...
Part 7: Various Aspects of Computer SecurityInternational audienceTwo neural networks with randomly ...
Neural networks can synchronize by learning from each other. For that purpose they receive common in...
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of crypto...
When establishing a cryptographic key between two users, the asymmetric cryptography scheme is gener...
In the Kanter’s and Kinsella’s works is proposes the use of two synchronized artificial neural netwo...
Secret sharing is a fundamental notion for secure cryptographic design. In a secret sharing scheme, ...
Part 5: Various Aspects of Computer SecurityInternational audienceThe phenomenon of neural networks ...
Neural networks’ synchronization by mutual learning discovered and described by Kanter et al. [10] c...