메뉴 건너뛰기




Volumn 54, Issue 4, 2005, Pages 421-427

Tree parity machine rekeying architectures

Author keywords

Algorithms implemented in hardware; Authentication; Pervasive computing; Security; Ubiquitous computing

Indexed keywords

ALGORITHMS; BANDWIDTH; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER ARCHITECTURE; COMPUTER HARDWARE; DATA COMMUNICATION SYSTEMS; EMBEDDED SYSTEMS; SYNCHRONIZATION;

EID: 17644426326     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2005.70     Document Type: Article
Times cited : (48)

References (29)
  • 2
    • 17644409195 scopus 로고    scopus 로고
    • "Eingebettete Sicherheit im Automobil. ESCAR - Embedded IT-Security in Cars, Cologne, Germany"
    • 18-19 Nov
    • C. Paar, "Eingebettete Sicherheit im Automobil. ESCAR - Embedded IT-Security in Cars, Cologne, Germany," 18-19 Nov. 2003.
    • (2003)
    • Paar, C.1
  • 7
    • 0003185688 scopus 로고
    • "La Cryptographie Militaire"
    • pp. 5-38, Jan. 1883, Feb
    • A. Kerckhoffs, "La Cryptographie Militaire," J. des Sciences Militaries, vol. IX, pp. 5-38, Jan. 1883, pp. 161-191, Feb. 1883.
    • (1883) J. Des Sciences Militaries , vol.9 , pp. 161-191
    • Kerckhoffs, A.1
  • 9
    • 0017018484 scopus 로고
    • "New Directions in Cryptography"
    • Nov
    • W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 84874800178 scopus 로고
    • "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms"
    • T.E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
    • (1985) IEEE Trans. Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 11
    • 0017930809 scopus 로고
    • "A Method for Obtaining Digital Signatures and Public Key Cryptosystems"
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 12
    • 17644364204 scopus 로고    scopus 로고
    • TopSec GSM, Data Sheet PD0757.6904.21, Rhode & Schwarz, Aug
    • Rhode & Schwarz, TopSec GSM, Data Sheet PD0757.6904.21, Aug. 2001.
    • (2001)
  • 14
    • 0036340335 scopus 로고    scopus 로고
    • "Secure Exchange of Information by Synchronization of Neural Networks"
    • I. Kanter, W. Kinzel, and E. Kanter, "Secure Exchange of Information by Synchronization of Neural Networks," Europhysics Letters, vol. 57, no. 1, pp. 141-147, 2002.
    • (2002) Europhysics Letters , vol.57 , Issue.1 , pp. 141-147
    • Kanter, I.1    Kinzel, W.2    Kanter, E.3
  • 15
    • 0034238005 scopus 로고    scopus 로고
    • "Interacting Neural Networks"
    • R. Metzler, W. Kinzel, and I. Kanter, "Interacting Neural Networks," Physics Rev. E, vol. 62, no. 2, pp. 2555-2565, 2000.
    • (2000) Physics Rev. E , vol.62 , Issue.2 , pp. 2555-2565
    • Metzler, R.1    Kinzel, W.2    Kanter, I.3
  • 16
    • 0142021471 scopus 로고    scopus 로고
    • "Interacting Neural Networks and Cryptography"
    • B. Kramer, ed., Springer Verlag
    • W. Kinzel and I. Kanter, "Interacting Neural Networks and Cryptography," Advances in Solid State Physics, B. Kramer, ed., Springer Verlag, 2002.
    • (2002) Advances in Solid State Physics
    • Kinzel, W.1    Kanter, I.2
  • 17
    • 17644425110 scopus 로고    scopus 로고
    • "Theory of Interacting Neural Networks"
    • S. Bornholdt and H. Schuster, eds., Wiley VCH
    • "Theory of Interacting Neural Networks," Handbook of Graphs and Networks, S. Bornholdt and H. Schuster, eds., Wiley VCH, 2003.
    • (2003) Handbook of Graphs and Networks
  • 18
    • 0027599802 scopus 로고
    • "Secret Key Agreement by Public Discussion"
    • U. Maurer, "Secret Key Agreement by Public Discussion," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 20
    • 41349083924 scopus 로고    scopus 로고
    • "Secure Key-Exchange Protocol with an Absence of Injective Functions"
    • 066102
    • R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, "Secure Key-Exchange Protocol with an Absence of Injective Functions," Physics Rev. E, vol. 66, no. 066102, 2002.
    • (2002) Physics Rev. E , vol.66
    • Mislovaty, R.1    Perchenok, Y.2    Kanter, I.3    Kinzel, W.4
  • 21
    • 37649031336 scopus 로고    scopus 로고
    • "Mutual Learning in a Tree Parity Machine and Its Application to Cryptography"
    • 066135
    • M. Rosen-Zvi, E. Klein, I. Kanter, and W. Kinzel, "Mutual Learning in a Tree Parity Machine and Its Application to Cryptography," Physics Rev. E., vol. 66, no. 066135, 2002.
    • (2002) Physics Rev. E. , vol.66
    • Rosen-Zvi, M.1    Klein, E.2    Kanter, I.3    Kinzel, W.4
  • 23
    • 17644369423 scopus 로고    scopus 로고
    • "Cooperating Attackers in Neural Cryptography"
    • Dec. preprint www.arxiv.org/cond-mat/0312068
    • L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, "Cooperating Attackers in Neural Cryptography," Dec. 2003, preprint www.arxiv.org/cond-mat/0312068.
    • (2003)
    • Shacham, L.N.1    Klein, E.2    Mislovaty, R.3    Kanter, I.4    Kinzel, W.5
  • 24
    • 12444293717 scopus 로고    scopus 로고
    • "Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Rekeying Techniques"
    • T. Okamoto, ed
    • M. Abdalla and M. Bellare, "Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Rekeying Techniques," Advances in Cryptology - Asiacrypt 2000 Proc., T. Okamoto, ed., 2000.
    • (2000) Advances in Cryptology - Asiacrypt 2000 Proc.
    • Abdalla, M.1    Bellare, M.2
  • 26
    • 0037195738 scopus 로고    scopus 로고
    • "Cryptography Based on Neural Networks - Analytical Results"
    • M. Rosen-Zvi, I. Kanter, and W. Kinzel, "Cryptography Based on Neural Networks - Analytical Results," J. Physics A: Math. Gen., vol. 35, no. 47, pp. L707-L713, 2002.
    • (2002) J. Physics A: Math. Gen. , vol.35 , Issue.47
    • Rosen-Zvi, M.1    Kanter, I.2    Kinzel, W.3
  • 27
    • 17644424111 scopus 로고    scopus 로고
    • "Repulsive Feedback Mechanisms in Neural Cryptography"
    • A. Ruttor and W. Kinzel, "Repulsive Feedback Mechanisms in Neural Cryptography," 2003.
    • (2003)
    • Ruttor, A.1    Kinzel, W.2
  • 28
    • 0142120725 scopus 로고    scopus 로고
    • "Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps"
    • 118701
    • R. Mislovaty, E. Klein, I. Kanter, and W. Kinzel, "Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps," Physics Rev. Letters, vol. 91, no. 118701, 2003.
    • (2003) Physics Rev. Letters , vol.91
    • Mislovaty, R.1    Klein, E.2    Kanter, I.3    Kinzel, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.