A Neural Network is a machine that is designed to model the way in which the brain performs a task or function of interest. It has the ability to perform complex computations with ease. The objective of this project was to investigate the use of ANNs in various kinds of digital circuits as well as in the field of Cryptography. During our project, we have studied different neural network architectures and training algorithms. A comparative study is done between different neural network architectures for an Adder and their merits/demerits are discussed. Using a Jordan (Recurrent network), trained by back-propagation algorithm, a finite state sequential machine was successfully implemented. The sequential machine thus obtained was used for...
Abstract: Cryptography is the exchange of information among the users without leakage or loses of in...
Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
Cryptography is the exchange of information among the users without leakage of information to others...
The project is aimed to implement artificial neural network method in cryptography. Cryptography is ...
Abstract — Cryptography is the ability of changing information into obvious unintelligibility in a w...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
Artificial neural networks (ANN) are currently widely used for solving problems and tasks in various...
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity ...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electro...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
Goal of this thesis is to get familiar with problematics of neural networks and commonly used securi...
This paper presents a new approach based on artificial neural networks (ANNs) for data security in e...
The main focus of this research paper is to propose and improvement of the data security using encry...
Abstract: Cryptography is the exchange of information among the users without leakage or loses of in...
Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...
Cryptography is the exchange of information among the users without leakage of information to others...
The project is aimed to implement artificial neural network method in cryptography. Cryptography is ...
Abstract — Cryptography is the ability of changing information into obvious unintelligibility in a w...
The use of neural networks for cryptography is demonstrated in this paper. There are two stages to t...
Artificial neural networks (ANN) are currently widely used for solving problems and tasks in various...
Chaotic systems are sensitive to initial conditions, system parameters and topological transitivity ...
A current trend of research focuses on artificial intelligence based cryptography which although pro...
Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electro...
Neural Network uses a technique that mimics human brain to try to find hidden connections in a colle...
Goal of this thesis is to get familiar with problematics of neural networks and commonly used securi...
This paper presents a new approach based on artificial neural networks (ANNs) for data security in e...
The main focus of this research paper is to propose and improvement of the data security using encry...
Abstract: Cryptography is the exchange of information among the users without leakage or loses of in...
Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, ...
Cryptography is a process of protecting information and data from unauthorized access. The goal of a...