Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
On-line learning in neural networks
On-line learning in neural networks
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Analysis of Neural Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Tree Parity Machine Rekeying Architectures
IEEE Transactions on Computers
IEEE Transactions on Neural Networks
New directions in cryptography
IEEE Transactions on Information Theory
Secret key agreement by public discussion from common information
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Neural cryptography is widely considered as a novel method of exchanging secret key between two neural networks through mutual learning. This paper puts forward a generalized architecture to provide an approach to designing novel neural cryptography. Meanwhile, by taking an in-depth investigation on the security of neural cryptography, a heuristic rule is proposed. These results can effectively guide us to designing secure neural cryptography. Finally, an example is given to demonstrate the effectiveness of the proposed structure and the heuristic rule.