The dichotomy of neural networks and cryptography: war and peace
B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …
AI makes crypto evolve
B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …
Neural networks-based cryptography: A survey
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …
although proposed almost thirty years ago could not attract much attention. Abadi and …
An Approach to the Implementation of a Neural Network for Cryptographic Protection of Data Transmission at UAV
An approach to the implementation of a neural network for real-time cryptographic data
protection with symmetric keys oriented on embedded systems is presented. This approach …
protection with symmetric keys oriented on embedded systems is presented. This approach …
Lightweight internet of things device authentication, encryption, and key distribution using end-to-end neural cryptosystems
Device authentication, encryption, and key distribution are of vital importance to any Internet
of Things (IoT) systems, such as the new smart city infrastructures. This is due to the concern …
of Things (IoT) systems, such as the new smart city infrastructures. This is due to the concern …
Hardware Components for Nonlinear Neuro-like Data Protection in Mobile Smart Systems
Rapid grows and expansion smart systems application, wide use data transmission
networks require cryptographic protection of such data. Graph model of nonlinear neuro-like …
networks require cryptographic protection of such data. Graph model of nonlinear neuro-like …
The Dichotomy of Crypto and NN: War and Peace
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …
have come together in war and peace; a cross-impact forms a dichotomy deserving a …
Preliminary study of applied binary neural networks for neural cryptography
Adversarial neural cryptography is deemed as an encouraging area of research that could
provide different perspective in the post-quantum cryptography age, specially for secure …
provide different perspective in the post-quantum cryptography age, specially for secure …
Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
In recent years, neural networks have been used to implement symmetric cryptographic
functions for secure communications. Extending this domain, the proposed approach …
functions for secure communications. Extending this domain, the proposed approach …
Learning asymmetric encryption using adversarial neural networks
We propose a multi-agent adversarial neural networks model where a sender (Alice) and a
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …