An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT

AAM Teodoro, OSM Gomes, M Saadi, BA Silva… - Wireless Personal …, 2022 - Springer
Nowadays, the high number of devices and applications connected to the Internet has
generated a great amount of data being which makes privacy and protection a more …

Neural Cryptography Based on Generalized Tree Parity Machine for Real‐Life Systems

S Jeong, C Park, D Hong, C Seo… - Security and …, 2021 - Wiley Online Library
Traditional public key exchange protocols are based on algebraic number theory. In another
perspective, neural cryptography, which is based on neural networks, has been emerging. It …

Neural networks-based cryptography: A survey

I Meraouche, S Dutta, H Tan, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …

A key agreement protocol based on spiking neural P systems with anti-spikes

MI Plesa, M Gheoghe, F Ipate, G Zhang - Journal of Membrane Computing, 2022 - Springer
Spiking neural P systems, SN P systems for short, have found various applications over time.
Perhaps the most important application to date is in the area of artificial intelligence where …

A modified key sifting scheme with artificial neural network based key reconciliation analysis in quantum cryptography

C Biswas, MM Haque, UD Gupta - IEEE Access, 2022 - ieeexplore.ieee.org
Quantum Cryptography emerged from the limitations of classical cryptography. It will play a
vital role in information security after the availability of expected powerful quantum …

[PDF][PDF] Enhancing IoT security using multi-layer feedforward neural network with tree parity machine elements

E Shishniashvili, L Mamisashvili… - Int J Simul Syst Sci …, 2020 - researchgate.net
To enhance IoT security level of Tree Parity Machines, TPMs, many researchers recently
tried to increase the number of neurons in a single hidden layer. In this paper we propose a …

Learning multi-party adversarial encryption and its application to secret sharing

I Meraouche, S Dutta, SK Mohanty, I Agudo… - IEEE …, 2022 - ieeexplore.ieee.org
Neural networks based cryptography has seen a significant growth since the introduction of
adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to …

Synchronization of Tree Parity Machines using nonbinary input vectors

M Stypiński, M Niemiec - IEEE Transactions on Neural …, 2022 - ieeexplore.ieee.org
Neural cryptography is the application of artificial neural networks (ANNs) in the subject of
cryptography. The functionality of this solution is based on a tree parity machine (TPM). It …

Neural coordination through spider monkey optimization-guided weight synchronization

A Sarkar - Multimedia Tools and Applications, 2023 - Springer
This paper proposes a Spider Monkey-based neural weight optimization approach for
quicker neural synchronization. To exchange the session key across a public channel, two …

Learning asymmetric encryption using adversarial neural networks

I Meraouche, S Dutta, H Tan, K Sakurai - Engineering Applications of …, 2023 - Elsevier
We propose a multi-agent adversarial neural networks model where a sender (Alice) and a
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …