An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT
Nowadays, the high number of devices and applications connected to the Internet has
generated a great amount of data being which makes privacy and protection a more …
generated a great amount of data being which makes privacy and protection a more …
Neural Cryptography Based on Generalized Tree Parity Machine for Real‐Life Systems
S Jeong, C Park, D Hong, C Seo… - Security and …, 2021 - Wiley Online Library
Traditional public key exchange protocols are based on algebraic number theory. In another
perspective, neural cryptography, which is based on neural networks, has been emerging. It …
perspective, neural cryptography, which is based on neural networks, has been emerging. It …
Neural networks-based cryptography: A survey
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …
although proposed almost thirty years ago could not attract much attention. Abadi and …
A key agreement protocol based on spiking neural P systems with anti-spikes
Spiking neural P systems, SN P systems for short, have found various applications over time.
Perhaps the most important application to date is in the area of artificial intelligence where …
Perhaps the most important application to date is in the area of artificial intelligence where …
A modified key sifting scheme with artificial neural network based key reconciliation analysis in quantum cryptography
C Biswas, MM Haque, UD Gupta - IEEE Access, 2022 - ieeexplore.ieee.org
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a
vital role in information security after the availability of expected powerful quantum …
vital role in information security after the availability of expected powerful quantum …
[PDF][PDF] Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements
E Shishniashvili, L Mamisashvili… - Int J Simul Syst Sci …, 2020 - researchgate.net
To enhance IoT security level of Tree Parity Machines, TPMs, many researchers recently
tried to increase the number of neurons in a single hidden layer. In this paper we propose a …
tried to increase the number of neurons in a single hidden layer. In this paper we propose a …
Learning multi-party adversarial encryption and its application to secret sharing
Neural networks based cryptography has seen a significant growth since the introduction of
adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to …
adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to …
Synchronization of Tree Parity Machines using nonbinary input vectors
M Stypiński, M Niemiec - IEEE Transactions on Neural …, 2022 - ieeexplore.ieee.org
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of
cryptography. The functionality of this solution is based on a tree parity machine (TPM). It …
cryptography. The functionality of this solution is based on a tree parity machine (TPM). It …
Neural coordination through spider monkey optimization-guided weight synchronization
A Sarkar - Multimedia Tools and Applications, 2023 - Springer
This paper proposes a Spider Monkey-based neural weight optimization approach for
quicker neural synchronization. To exchange the session key across a public channel, two …
quicker neural synchronization. To exchange the session key across a public channel, two …
Learning asymmetric encryption using adversarial neural networks
We propose a multi-agent adversarial neural networks model where a sender (Alice) and a
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …