The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

Neural networks-based cryptography: A survey

I Meraouche, S Dutta, H Tan, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …

An Approach to the Implementation of a Neural Network for Cryptographic Protection of Data Transmission at UAV

I Tsmots, V Teslyuk, A Łukaszewicz, Y Lukashchuk… - Drones, 2023 - mdpi.com
An approach to the implementation of a neural network for real-time cryptographic data
protection with symmetric keys oriented on embedded systems is presented. This approach …

Lightweight internet of things device authentication, encryption, and key distribution using end-to-end neural cryptosystems

Y Sun, FPW Lo, B Lo - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Device authentication, encryption, and key distribution are of vital importance to any Internet
of Things (IoT) systems, such as the new smart city infrastructures. This is due to the concern …

Hardware Components for Nonlinear Neuro-like Data Protection in Mobile Smart Systems

I Tsmots, R Tkachenko, V Teslyuk… - 2022 IEEE 17th …, 2022 - ieeexplore.ieee.org
Rapid grows and expansion smart systems application, wide use data transmission
networks require cryptographic protection of such data. Graph model of nonlinear neuro-like …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

Preliminary study of applied binary neural networks for neural cryptography

RHV Tenorio, CW Sham, DV Vargas - Proceedings of the 2020 Genetic …, 2020 - dl.acm.org
Adversarial neural cryptography is deemed as an encouraging area of research that could
provide different perspective in the post-quantum cryptography age, specially for secure …

Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication

MC Wøien, FO Catak, M Kuzlu, U Cali - arXiv preprint arXiv:2407.08831, 2024 - arxiv.org
In recent years, neural networks have been used to implement symmetric cryptographic
functions for secure communications. Extending this domain, the proposed approach …

Learning asymmetric encryption using adversarial neural networks

I Meraouche, S Dutta, H Tan, K Sakurai - Engineering Applications of …, 2023 - Elsevier
We propose a multi-agent adversarial neural networks model where a sender (Alice) and a
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …