메뉴 건너뛰기




Volumn 3, Issue 2, 2008, Pages 42-53

On the use of recurrent neural networks to design symmetric ciphers

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATIONAL METHODS; COMPUTER SIMULATION; NETWORK ARCHITECTURE; NETWORK SECURITY;

EID: 42949131129     PISSN: 1556603X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCI.2008.919075     Document Type: Article
Times cited : (26)

References (56)
  • 9
    • 77956597680 scopus 로고    scopus 로고
    • I. Woungang, A. Sadeghian, S. Wu, S. Misra, M. Arvandi, Wireless Web Security Using a Neural Network-Based Cipher, Chapter II in Web Services Security and E-Business, G. Radhammani and G. S.V. Radha Krishna Rao (Eds.), Idea Group Publishing Inc., USA, ISBN: 1-59904-168-5, pp. 32-56, 2006.
    • I. Woungang, A. Sadeghian, S. Wu, S. Misra, M. Arvandi, "Wireless Web Security Using a Neural Network-Based Cipher," Chapter II in "Web Services Security and E-Business," G. Radhammani and G. S.V. Radha Krishna Rao (Eds.), Idea Group Publishing Inc., USA, ISBN: 1-59904-168-5, pp. 32-56, 2006.
  • 11
    • 0025635525 scopus 로고
    • Connectionist nonparametric regression: Multilayer feedforward networks can learn arbitrary mappings
    • H. White, "Connectionist nonparametric regression: Multilayer feedforward networks can learn arbitrary mappings," Neural Networks, vol. 3, no. 5, pp. 535-549, 1990.
    • (1990) Neural Networks , vol.3 , Issue.5 , pp. 535-549
    • White, H.1
  • 12
    • 0024880831 scopus 로고
    • Multi-layer feedforward networks are universal approximator
    • K. Hornik, M. Stinchcombe, and H. White, "Multi-layer feedforward networks are universal approximator," Neural Networks, vol. 2, no. 5, pp. 359-366, 1989.
    • (1989) Neural Networks , vol.2 , Issue.5 , pp. 359-366
    • Hornik, K.1    Stinchcombe, M.2    White, H.3
  • 13
    • 85011438572 scopus 로고    scopus 로고
    • Approximation theory of the MLP model in neural networks
    • Cambridge University Press
    • A. Pincus, "Approximation theory of the MLP model in neural networks," Acta Numerica, pp. 143-195, Cambridge University Press, 1999.
    • (1999) Acta Numerica , pp. 143-195
    • Pincus, A.1
  • 15
    • 0031233348 scopus 로고    scopus 로고
    • Are artificial neural networks black boxes?
    • Sept
    • J. Benitez, and J.L. Castro, and I. Requena, "Are artificial neural networks black boxes?" IEEE Trans. Neural Networks, vol. 8, no. 5, pp.1156-1164, Sept. 1997.
    • (1997) IEEE Trans. Neural Networks , vol.8 , Issue.5 , pp. 1156-1164
    • Benitez, J.1    Castro, J.L.2    Requena, I.3
  • 17
    • 34248383752 scopus 로고
    • Cryptography and Machine Learning
    • Advances in Cryptology
    • R.L. Rivest, "Cryptography and Machine Learning," Advances in Cryptology, Lecture Notes In Computer Science, vol. 739, pp. 427-439, 1991.
    • (1991) Lecture Notes In Computer Science , vol.739 , pp. 427-439
    • Rivest, R.L.1
  • 18
    • 3342923348 scopus 로고
    • Neural Networks and Their Cryptographic Applications
    • D. Pointcheval, "Neural Networks and Their Cryptographic Applications," in Proc. of Eurocode, pp. 183-193, 1994.
    • (1994) Proc. of Eurocode , pp. 183-193
    • Pointcheval, D.1
  • 20
    • 42749101363 scopus 로고    scopus 로고
    • A. Ruttor, W. Kinzel, L. Shacham and I. Kanter, Neural cryptography with feedback, Phys. Rev. E., (69): 046110-1-7, 2004.
    • A. Ruttor, W. Kinzel, L. Shacham and I. Kanter, "Neural cryptography with feedback," Phys. Rev. E., (69): 046110-1-7, 2004.
  • 22
    • 42749100878 scopus 로고    scopus 로고
    • L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, Cooperating attackers in neural cryptography, Phys. Rev. E., (69), 066137-1-4, 2004.
    • L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, "Cooperating attackers in neural cryptography," Phys. Rev. E., (69), 066137-1-4, 2004.
  • 23
    • 41349083924 scopus 로고    scopus 로고
    • R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, Secure key-exchange protocol with an absence of injective functions, Phys. Rev. E., (66): 066102-1-5, 2002.
    • R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, "Secure key-exchange protocol with an absence of injective functions," Phys. Rev. E., (66): 066102-1-5, 2002.
  • 24
    • 0142021471 scopus 로고    scopus 로고
    • Interacting Neural Networks and Cryptography
    • B. Kramer ed, Berlin: Springer
    • W. Kinzel and I. Kanter, "Interacting Neural Networks and Cryptography," Advances in Solid State Physics. B. Kramer (ed.), vol. 42, pp. 383-391, Berlin: Springer, 2002.
    • (2002) Advances in Solid State Physics , vol.42 , pp. 383-391
    • Kinzel, W.1    Kanter, I.2
  • 25
    • 0037195738 scopus 로고    scopus 로고
    • Cryptography based on neural networks-analytical results
    • M. Rosen-Zvi, I. Kanter and W. Kinzel, "Cryptography based on neural networks-analytical results," J. Phys. A: Math. Gen., vol. 35, no. 47, pp. 707-713, 2002.
    • (2002) J. Phys. A: Math. Gen , vol.35 , Issue.47 , pp. 707-713
    • Rosen-Zvi, M.1    Kanter, I.2    Kinzel, W.3
  • 26
    • 17644426326 scopus 로고    scopus 로고
    • Tree Parity Machine Rekeying Architectures
    • April
    • M. Volkmer and S. Wallner, "Tree Parity Machine Rekeying Architectures," IEEE Trans. Computers, vol. 54, no. 4, pp. 421-427, April 2005.
    • (2005) IEEE Trans. Computers , vol.54 , Issue.4 , pp. 421-427
    • Volkmer, M.1    Wallner, S.2
  • 27
    • 42949112865 scopus 로고    scopus 로고
    • Synchronization of neural networks by mutual learning & its application to cryptography
    • E. Klein, R. Mislovaty, I. Kanter, A. Ruttor, and W. Kinzel, "Synchronization of neural networks by mutual learning & its application to cryptography," NIPS, pp. 689-696, 2004.
    • (2004) NIPS , pp. 689-696
    • Klein, E.1    Mislovaty, R.2    Kanter, I.3    Ruttor, A.4    Kinzel, W.5
  • 29
    • 20144379395 scopus 로고    scopus 로고
    • Step to improve neural cryptography against flipping attacks
    • Dec
    • J. Zhou, Q. Xu, W. Pei, Z. He, and H. Szu, "Step to improve neural cryptography against flipping attacks," Int. J. Neural Syst., vol. 14, no. 6, pp. 393-405, Dec. 2004.
    • (2004) Int. J. Neural Syst , vol.14 , Issue.6 , pp. 393-405
    • Zhou, J.1    Xu, Q.2    Pei, W.3    He, Z.4    Szu, H.5
  • 32
    • 2342565045 scopus 로고    scopus 로고
    • Design and realization of a new chaotic neural encryption/decryption network
    • S. Su, A. Lin, and J. Yen, "Design and realization of a new chaotic neural encryption/decryption network," IEEE Asia-Pacific Conf. Cir. & Syst., pp. 335-338, 2000.
    • (2000) IEEE Asia-Pacific Conf. Cir. & Syst , pp. 335-338
    • Su, S.1    Lin, A.2    Yen, J.3
  • 33
    • 34248366641 scopus 로고    scopus 로고
    • A Combined Hash and Encryption Scheme by Chaotic Neural Network
    • D. Xiao and X. Liao, "A Combined Hash and Encryption Scheme by Chaotic Neural Network," Proc. Int'l Sym. Neural Nets 2004, vol. 2, pp. 633-638, 2004.
    • (2004) Proc. Int'l Sym. Neural Nets 2004 , vol.2 , pp. 633-638
    • Xiao, D.1    Liao, X.2
  • 34
    • 35048844681 scopus 로고    scopus 로고
    • Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme, 5th Pacific Rim Conf
    • C. Li, S. Li, D. Zhang and G. Chen, "Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme," 5th Pacific Rim Conf. Multimedia, pp. 418-425, 2004.
    • (2004) Multimedia , pp. 418-425
    • Li, C.1    Li, S.2    Zhang, D.3    Chen, G.4
  • 35
    • 27144443033 scopus 로고    scopus 로고
    • Novel public key encryption technique based on multiple chaotic systems
    • R. Bose, "Novel public key encryption technique based on multiple chaotic systems," Phys. Rew. Lett. 95, 2005.
    • (2005) Phys. Rew. Lett , vol.95
    • Bose, R.1
  • 36
    • 27144443033 scopus 로고    scopus 로고
    • Comment on Novel Public Key Encryption Technique Based on Multiple Chaotic Systems
    • K. Wang, W.J. Pei, Z.L. Hua, Z.Y. He, "Comment on Novel Public Key Encryption Technique Based on Multiple Chaotic Systems," Phys. Rew. Lett. 95, 2005.
    • (2005) Phys. Rew. Lett , vol.95
    • Wang, K.1    Pei, W.J.2    Hua, Z.L.3    He, Z.Y.4
  • 37
    • 24944540818 scopus 로고    scopus 로고
    • A novel symmetric cryptography based on chaotic signal generator and a clipped neural network
    • T. Zhou, X. Liao, Y. Chen, "A novel symmetric cryptography based on chaotic signal generator and a clipped neural network," Lecture notes in Computer Science, Advances in Neural Networks, vol. 3174, pp. 639-644, 2004.
    • (2004) Lecture notes in Computer Science, Advances in Neural Networks , vol.3174 , pp. 639-644
    • Zhou, T.1    Liao, X.2    Chen, Y.3
  • 38
    • 0035271446 scopus 로고    scopus 로고
    • The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
    • March
    • C. Chi-Kwong, L.M. Cheng, "The convergence properties of a clipped Hopfield network and its application in the design of keystream generator," IEEE Trans. Neural Networks, vol. 12, no. 2, pp. 340-348, March 2001.
    • (2001) IEEE Trans. Neural Networks , vol.12 , Issue.2 , pp. 340-348
    • Chi-Kwong, C.1    Cheng, L.M.2
  • 41
    • 34248396503 scopus 로고    scopus 로고
    • Cryptography through Interpolation, Approximation and Computational Intelligence methods
    • C.G. Meletiou, D.K. Tasoulis, and M.N. Vrahatis, "Cryptography through Interpolation, Approximation and Computational Intelligence methods," Bulletin of the Greek Mathematical Society, vol. 48, pp. 61-75, 2003.
    • (2003) Bulletin of the Greek Mathematical Society , vol.48 , pp. 61-75
    • Meletiou, C.G.1    Tasoulis, D.K.2    Vrahatis, M.N.3
  • 42
    • 0038355068 scopus 로고    scopus 로고
    • On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
    • D.A. Karras and V. Zorkadis "On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators," Neural Networks, vol. 16, no. 5-6, pp. 899-905, 2003.
    • (2003) Neural Networks , vol.16 , Issue.5-6 , pp. 899-905
    • Karras, D.A.1    Zorkadis, V.2
  • 43
    • 24944501339 scopus 로고    scopus 로고
    • Improving Ability of Passive Attacks of Chaotic Encryption by Using Neural Network
    • X. Yang, X. Huang and H. Huang, "Improving Ability of Passive Attacks of Chaotic Encryption by Using Neural Network," Lecture Notes in Computer Science, pp. 624-629, 2005.
    • (2005) Lecture Notes in Computer Science , pp. 624-629
    • Yang, X.1    Huang, X.2    Huang, H.3
  • 46
    • 33750109356 scopus 로고    scopus 로고
    • Neural Networks Following a Binary Approach Applied to the Integer Prime-Factorization Problem
    • B. Jansen, and K. Nakayama, "Neural Networks Following a Binary Approach Applied to the Integer Prime-Factorization Problem," in Proc. of the International Joint Conference on Neural Network, vol. 4, pp. 2577-2582, 2005.
    • (2005) Proc. of the International Joint Conference on Neural Network , vol.4 , pp. 2577-2582
    • Jansen, B.1    Nakayama, K.2
  • 47
    • 0141460497 scopus 로고    scopus 로고
    • Improving pseudorandom bit sequence generation and evaluation for secure Internet communications using neural network techniques
    • D.A. Karras, and V. Zorkadis, "Improving pseudorandom bit sequence generation and evaluation for secure Internet communications using neural network techniques," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1367-1372, 2003.
    • (2003) Proc. of the International Joint Conference on Neural Network , vol.2 , pp. 1367-1372
    • Karras, D.A.1    Zorkadis, V.2
  • 48
    • 0032687653 scopus 로고    scopus 로고
    • A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks
    • D. Guo, L.M. Cheng and L.L. Cheng, "A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks," Applied Intelligence, vol. 10, no. 1, pp. 71-84, 1999.
    • (1999) Applied Intelligence , vol.10 , Issue.1 , pp. 71-84
    • Guo, D.1    Cheng, L.M.2    Cheng, L.L.3
  • 50
    • 0027662338 scopus 로고
    • Pruning Algorithms: A Survey
    • R. Reed, "Pruning Algorithms: a Survey," IEEE Trans. Neural Networks, vol. 4, no. 5, pp. 740-747, 1993.
    • (1993) IEEE Trans. Neural Networks , vol.4 , Issue.5 , pp. 740-747
    • Reed, R.1
  • 53
    • 0023563286 scopus 로고
    • Learning rule for asynchronous perceptrons with feedback in a combinatorial environment
    • L. Almeida, "Learning rule for asynchronous perceptrons with feedback in a combinatorial environment," in Proc. of the 1st IEEE International Conf. on Neural Networks, vol. 2, pp. 105-110, 1987.
    • (1987) Proc. of the 1st IEEE International Conf. on Neural Networks , vol.2 , pp. 105-110
    • Almeida, L.1
  • 55
    • 42949151699 scopus 로고    scopus 로고
    • ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, Nov. 26, 2001, http://csrc.nist.gov/publications/ fips/fips197/ fips-197.pdf
    • ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, Nov. 26, 2001, http://csrc.nist.gov/publications/ fips/fips197/ fips-197.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.