-
8
-
-
40649109581
-
Symmetric Cipher Design Using Recurrent Neural Networks
-
M. Arvandi, S. Wu, A. Sadeghian, W. Melek, and I. Woungang, "Symmetric Cipher Design Using Recurrent Neural Networks," in Proc. of the International Joint Conference on Neural Networks, pp. 2039-2046, 2006.
-
(2006)
Proc. of the International Joint Conference on Neural Networks
, pp. 2039-2046
-
-
Arvandi, M.1
Wu, S.2
Sadeghian, A.3
Melek, W.4
Woungang, I.5
-
9
-
-
77956597680
-
-
I. Woungang, A. Sadeghian, S. Wu, S. Misra, M. Arvandi, Wireless Web Security Using a Neural Network-Based Cipher, Chapter II in Web Services Security and E-Business, G. Radhammani and G. S.V. Radha Krishna Rao (Eds.), Idea Group Publishing Inc., USA, ISBN: 1-59904-168-5, pp. 32-56, 2006.
-
I. Woungang, A. Sadeghian, S. Wu, S. Misra, M. Arvandi, "Wireless Web Security Using a Neural Network-Based Cipher," Chapter II in "Web Services Security and E-Business," G. Radhammani and G. S.V. Radha Krishna Rao (Eds.), Idea Group Publishing Inc., USA, ISBN: 1-59904-168-5, pp. 32-56, 2006.
-
-
-
-
10
-
-
0002520528
-
A general framework for parallel distributed processing Source
-
MIT Press
-
D.E. Rumelhart, G.E. Hinton, and J.L. McClelland, "A general framework for parallel distributed processing Source," Parallel distributed processing: explorations in the microstructure of cognition, Computational Models of Cognition and Perception Series, vol. 1, pp. 45-76, MIT Press, 1986.
-
(1986)
Parallel distributed processing: Explorations in the microstructure of cognition, Computational Models of Cognition and Perception Series
, vol.1
, pp. 45-76
-
-
Rumelhart, D.E.1
Hinton, G.E.2
McClelland, J.L.3
-
11
-
-
0025635525
-
Connectionist nonparametric regression: Multilayer feedforward networks can learn arbitrary mappings
-
H. White, "Connectionist nonparametric regression: Multilayer feedforward networks can learn arbitrary mappings," Neural Networks, vol. 3, no. 5, pp. 535-549, 1990.
-
(1990)
Neural Networks
, vol.3
, Issue.5
, pp. 535-549
-
-
White, H.1
-
12
-
-
0024880831
-
Multi-layer feedforward networks are universal approximator
-
K. Hornik, M. Stinchcombe, and H. White, "Multi-layer feedforward networks are universal approximator," Neural Networks, vol. 2, no. 5, pp. 359-366, 1989.
-
(1989)
Neural Networks
, vol.2
, Issue.5
, pp. 359-366
-
-
Hornik, K.1
Stinchcombe, M.2
White, H.3
-
13
-
-
85011438572
-
Approximation theory of the MLP model in neural networks
-
Cambridge University Press
-
A. Pincus, "Approximation theory of the MLP model in neural networks," Acta Numerica, pp. 143-195, Cambridge University Press, 1999.
-
(1999)
Acta Numerica
, pp. 143-195
-
-
Pincus, A.1
-
15
-
-
0031233348
-
Are artificial neural networks black boxes?
-
Sept
-
J. Benitez, and J.L. Castro, and I. Requena, "Are artificial neural networks black boxes?" IEEE Trans. Neural Networks, vol. 8, no. 5, pp.1156-1164, Sept. 1997.
-
(1997)
IEEE Trans. Neural Networks
, vol.8
, Issue.5
, pp. 1156-1164
-
-
Benitez, J.1
Castro, J.L.2
Requena, I.3
-
17
-
-
34248383752
-
Cryptography and Machine Learning
-
Advances in Cryptology
-
R.L. Rivest, "Cryptography and Machine Learning," Advances in Cryptology, Lecture Notes In Computer Science, vol. 739, pp. 427-439, 1991.
-
(1991)
Lecture Notes In Computer Science
, vol.739
, pp. 427-439
-
-
Rivest, R.L.1
-
18
-
-
3342923348
-
Neural Networks and Their Cryptographic Applications
-
D. Pointcheval, "Neural Networks and Their Cryptographic Applications," in Proc. of Eurocode, pp. 183-193, 1994.
-
(1994)
Proc. of Eurocode
, pp. 183-193
-
-
Pointcheval, D.1
-
19
-
-
84968561534
-
Neural Cryptography
-
W. Kinzel, and I. Kanter, "Neural Cryptography," Proc. of the 9th Int'l Conf. on Neural Information Processing (ICONIP'02), vol. 3, pp. 1351-1354, 2002.
-
(2002)
Proc. of the 9th Int'l Conf. on Neural Information Processing (ICONIP'02)
, vol.3
, pp. 1351-1354
-
-
Kinzel, W.1
Kanter, I.2
-
20
-
-
42749101363
-
-
A. Ruttor, W. Kinzel, L. Shacham and I. Kanter, Neural cryptography with feedback, Phys. Rev. E., (69): 046110-1-7, 2004.
-
A. Ruttor, W. Kinzel, L. Shacham and I. Kanter, "Neural cryptography with feedback," Phys. Rev. E., (69): 046110-1-7, 2004.
-
-
-
-
21
-
-
0142120725
-
Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps
-
R. Mislovaty, E. Klein, I. Kanter, and W. Kinzel, "Public Channel Cryptography by Synchronization of Neural Networks and Chaotic Maps," Phys. Rev. Lett., (91), 118701-1-4, 2003.
-
(2003)
Phys. Rev. Lett., (91), 118701-1-4
-
-
Mislovaty, R.1
Klein, E.2
Kanter, I.3
Kinzel, W.4
-
22
-
-
42749100878
-
-
L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, Cooperating attackers in neural cryptography, Phys. Rev. E., (69), 066137-1-4, 2004.
-
L.N. Shacham, E. Klein, R. Mislovaty, I. Kanter, and W. Kinzel, "Cooperating attackers in neural cryptography," Phys. Rev. E., (69), 066137-1-4, 2004.
-
-
-
-
23
-
-
41349083924
-
-
R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, Secure key-exchange protocol with an absence of injective functions, Phys. Rev. E., (66): 066102-1-5, 2002.
-
R. Mislovaty, Y. Perchenok, I. Kanter, and W. Kinzel, "Secure key-exchange protocol with an absence of injective functions," Phys. Rev. E., (66): 066102-1-5, 2002.
-
-
-
-
24
-
-
0142021471
-
Interacting Neural Networks and Cryptography
-
B. Kramer ed, Berlin: Springer
-
W. Kinzel and I. Kanter, "Interacting Neural Networks and Cryptography," Advances in Solid State Physics. B. Kramer (ed.), vol. 42, pp. 383-391, Berlin: Springer, 2002.
-
(2002)
Advances in Solid State Physics
, vol.42
, pp. 383-391
-
-
Kinzel, W.1
Kanter, I.2
-
25
-
-
0037195738
-
Cryptography based on neural networks-analytical results
-
M. Rosen-Zvi, I. Kanter and W. Kinzel, "Cryptography based on neural networks-analytical results," J. Phys. A: Math. Gen., vol. 35, no. 47, pp. 707-713, 2002.
-
(2002)
J. Phys. A: Math. Gen
, vol.35
, Issue.47
, pp. 707-713
-
-
Rosen-Zvi, M.1
Kanter, I.2
Kinzel, W.3
-
26
-
-
17644426326
-
Tree Parity Machine Rekeying Architectures
-
April
-
M. Volkmer and S. Wallner, "Tree Parity Machine Rekeying Architectures," IEEE Trans. Computers, vol. 54, no. 4, pp. 421-427, April 2005.
-
(2005)
IEEE Trans. Computers
, vol.54
, Issue.4
, pp. 421-427
-
-
Volkmer, M.1
Wallner, S.2
-
27
-
-
42949112865
-
Synchronization of neural networks by mutual learning & its application to cryptography
-
E. Klein, R. Mislovaty, I. Kanter, A. Ruttor, and W. Kinzel, "Synchronization of neural networks by mutual learning & its application to cryptography," NIPS, pp. 689-696, 2004.
-
(2004)
NIPS
, pp. 689-696
-
-
Klein, E.1
Mislovaty, R.2
Kanter, I.3
Ruttor, A.4
Kinzel, W.5
-
28
-
-
84891304223
-
Analysis of Neural Cryptography
-
A. Klimov, A. Mityaguine, and A. Shamir, "Analysis of Neural Cryptography," AsiaCrypt 2002, pp. 288-298, 2002.
-
(2002)
AsiaCrypt 2002
, pp. 288-298
-
-
Klimov, A.1
Mityaguine, A.2
Shamir, A.3
-
29
-
-
20144379395
-
Step to improve neural cryptography against flipping attacks
-
Dec
-
J. Zhou, Q. Xu, W. Pei, Z. He, and H. Szu, "Step to improve neural cryptography against flipping attacks," Int. J. Neural Syst., vol. 14, no. 6, pp. 393-405, Dec. 2004.
-
(2004)
Int. J. Neural Syst
, vol.14
, Issue.6
, pp. 393-405
-
-
Zhou, J.1
Xu, Q.2
Pei, W.3
He, Z.4
Szu, H.5
-
30
-
-
27644590063
-
Security of neural cryptography
-
R. Mislovaty, E. Klein, I. Kanter, and W. Kinzel, "Security of neural cryptography," 11th IEEE Int'l Conf. on Electronics, Circuits and Systems, pp. 219-221, pp. 13-15, 2004.
-
(2004)
11th IEEE Int'l Conf. on Electronics, Circuits and Systems
-
-
Mislovaty, R.1
Klein, E.2
Kanter, I.3
Kinzel, W.4
-
32
-
-
2342565045
-
Design and realization of a new chaotic neural encryption/decryption network
-
S. Su, A. Lin, and J. Yen, "Design and realization of a new chaotic neural encryption/decryption network," IEEE Asia-Pacific Conf. Cir. & Syst., pp. 335-338, 2000.
-
(2000)
IEEE Asia-Pacific Conf. Cir. & Syst
, pp. 335-338
-
-
Su, S.1
Lin, A.2
Yen, J.3
-
33
-
-
34248366641
-
A Combined Hash and Encryption Scheme by Chaotic Neural Network
-
D. Xiao and X. Liao, "A Combined Hash and Encryption Scheme by Chaotic Neural Network," Proc. Int'l Sym. Neural Nets 2004, vol. 2, pp. 633-638, 2004.
-
(2004)
Proc. Int'l Sym. Neural Nets 2004
, vol.2
, pp. 633-638
-
-
Xiao, D.1
Liao, X.2
-
34
-
-
35048844681
-
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme, 5th Pacific Rim Conf
-
C. Li, S. Li, D. Zhang and G. Chen, "Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme," 5th Pacific Rim Conf. Multimedia, pp. 418-425, 2004.
-
(2004)
Multimedia
, pp. 418-425
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
35
-
-
27144443033
-
Novel public key encryption technique based on multiple chaotic systems
-
R. Bose, "Novel public key encryption technique based on multiple chaotic systems," Phys. Rew. Lett. 95, 2005.
-
(2005)
Phys. Rew. Lett
, vol.95
-
-
Bose, R.1
-
36
-
-
27144443033
-
Comment on Novel Public Key Encryption Technique Based on Multiple Chaotic Systems
-
K. Wang, W.J. Pei, Z.L. Hua, Z.Y. He, "Comment on Novel Public Key Encryption Technique Based on Multiple Chaotic Systems," Phys. Rew. Lett. 95, 2005.
-
(2005)
Phys. Rew. Lett
, vol.95
-
-
Wang, K.1
Pei, W.J.2
Hua, Z.L.3
He, Z.Y.4
-
37
-
-
24944540818
-
A novel symmetric cryptography based on chaotic signal generator and a clipped neural network
-
T. Zhou, X. Liao, Y. Chen, "A novel symmetric cryptography based on chaotic signal generator and a clipped neural network," Lecture notes in Computer Science, Advances in Neural Networks, vol. 3174, pp. 639-644, 2004.
-
(2004)
Lecture notes in Computer Science, Advances in Neural Networks
, vol.3174
, pp. 639-644
-
-
Zhou, T.1
Liao, X.2
Chen, Y.3
-
38
-
-
0035271446
-
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
-
March
-
C. Chi-Kwong, L.M. Cheng, "The convergence properties of a clipped Hopfield network and its application in the design of keystream generator," IEEE Trans. Neural Networks, vol. 12, no. 2, pp. 340-348, March 2001.
-
(2001)
IEEE Trans. Neural Networks
, vol.12
, Issue.2
, pp. 340-348
-
-
Chi-Kwong, C.1
Cheng, L.M.2
-
41
-
-
34248396503
-
Cryptography through Interpolation, Approximation and Computational Intelligence methods
-
C.G. Meletiou, D.K. Tasoulis, and M.N. Vrahatis, "Cryptography through Interpolation, Approximation and Computational Intelligence methods," Bulletin of the Greek Mathematical Society, vol. 48, pp. 61-75, 2003.
-
(2003)
Bulletin of the Greek Mathematical Society
, vol.48
, pp. 61-75
-
-
Meletiou, C.G.1
Tasoulis, D.K.2
Vrahatis, M.N.3
-
42
-
-
0038355068
-
On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
-
D.A. Karras and V. Zorkadis "On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators," Neural Networks, vol. 16, no. 5-6, pp. 899-905, 2003.
-
(2003)
Neural Networks
, vol.16
, Issue.5-6
, pp. 899-905
-
-
Karras, D.A.1
Zorkadis, V.2
-
43
-
-
24944501339
-
Improving Ability of Passive Attacks of Chaotic Encryption by Using Neural Network
-
X. Yang, X. Huang and H. Huang, "Improving Ability of Passive Attacks of Chaotic Encryption by Using Neural Network," Lecture Notes in Computer Science, pp. 624-629, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 624-629
-
-
Yang, X.1
Huang, X.2
Huang, H.3
-
44
-
-
0036086002
-
Application of multilayer perceptron network as a oneway hash function
-
L.P. Yee, and L.C. De Silva, "Application of multilayer perceptron network as a oneway hash function," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1459-1462, 2002.
-
(2002)
Proc. of the International Joint Conference on Neural Network
, vol.2
, pp. 1459-1462
-
-
Yee, L.P.1
De Silva, L.C.2
-
45
-
-
0036079845
-
Application of multilayer perceptron networks in symmetric block ciphers
-
L.P. Yee, and L.C. De Silva, "Application of multilayer perceptron networks in symmetric block ciphers," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1455-1458, 2002.
-
(2002)
Proc. of the International Joint Conference on Neural Network
, vol.2
, pp. 1455-1458
-
-
Yee, L.P.1
De Silva, L.C.2
-
46
-
-
33750109356
-
Neural Networks Following a Binary Approach Applied to the Integer Prime-Factorization Problem
-
B. Jansen, and K. Nakayama, "Neural Networks Following a Binary Approach Applied to the Integer Prime-Factorization Problem," in Proc. of the International Joint Conference on Neural Network, vol. 4, pp. 2577-2582, 2005.
-
(2005)
Proc. of the International Joint Conference on Neural Network
, vol.4
, pp. 2577-2582
-
-
Jansen, B.1
Nakayama, K.2
-
47
-
-
0141460497
-
Improving pseudorandom bit sequence generation and evaluation for secure Internet communications using neural network techniques
-
D.A. Karras, and V. Zorkadis, "Improving pseudorandom bit sequence generation and evaluation for secure Internet communications using neural network techniques," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1367-1372, 2003.
-
(2003)
Proc. of the International Joint Conference on Neural Network
, vol.2
, pp. 1367-1372
-
-
Karras, D.A.1
Zorkadis, V.2
-
48
-
-
0032687653
-
A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks
-
D. Guo, L.M. Cheng and L.L. Cheng, "A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks," Applied Intelligence, vol. 10, no. 1, pp. 71-84, 1999.
-
(1999)
Applied Intelligence
, vol.10
, Issue.1
, pp. 71-84
-
-
Guo, D.1
Cheng, L.M.2
Cheng, L.L.3
-
49
-
-
24944547508
-
Chosen-plaintext cryptanalysis of a clippedneuralnetwork-based chaotic cipher
-
C. Li, S. Li, D. Zhang, and G. Chen, "Chosen-plaintext cryptanalysis of a clippedneuralnetwork-based chaotic cipher," Lecture Notes in Computer Science, Advances in Neural Networks, vol. 3497, pp. 630-636, 2005.
-
(2005)
Lecture Notes in Computer Science, Advances in Neural Networks
, vol.3497
, pp. 630-636
-
-
Li, C.1
Li, S.2
Zhang, D.3
Chen, G.4
-
50
-
-
0027662338
-
Pruning Algorithms: A Survey
-
R. Reed, "Pruning Algorithms: a Survey," IEEE Trans. Neural Networks, vol. 4, no. 5, pp. 740-747, 1993.
-
(1993)
IEEE Trans. Neural Networks
, vol.4
, Issue.5
, pp. 740-747
-
-
Reed, R.1
-
52
-
-
0033640658
-
Existence and Learning of Oscillations in Recurrent Neural Networks
-
S. Townley, A. Iichmann, M.G. Weiss, W. McClements, A.C. Ruiz, D.H. Owens, and D. Pratzel-Wolters, "Existence and Learning of Oscillations in Recurrent Neural Networks," IEEE Trans. Neural Networks, vol. 11, no. 1, pp. 205-214, 2000.
-
(2000)
IEEE Trans. Neural Networks
, vol.11
, Issue.1
, pp. 205-214
-
-
Townley, S.1
Iichmann, A.2
Weiss, M.G.3
McClements, W.4
Ruiz, A.C.5
Owens, D.H.6
Pratzel-Wolters, D.7
-
53
-
-
0023563286
-
Learning rule for asynchronous perceptrons with feedback in a combinatorial environment
-
L. Almeida, "Learning rule for asynchronous perceptrons with feedback in a combinatorial environment," in Proc. of the 1st IEEE International Conf. on Neural Networks, vol. 2, pp. 105-110, 1987.
-
(1987)
Proc. of the 1st IEEE International Conf. on Neural Networks
, vol.2
, pp. 105-110
-
-
Almeida, L.1
-
54
-
-
0033907698
-
TCP Vegas revisited
-
U. Hengartner, J. Bolliger, and T. Gross, "TCP Vegas revisited," in Proc. of the INFOCOM, 19th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1546-1555, 2000.
-
(2000)
Proc. of the INFOCOM, 19th Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1546-1555
-
-
Hengartner, U.1
Bolliger, J.2
Gross, T.3
-
55
-
-
42949151699
-
-
ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, Nov. 26, 2001, http://csrc.nist.gov/publications/ fips/fips197/ fips-197.pdf
-
ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, Nov. 26, 2001, http://csrc.nist.gov/publications/ fips/fips197/ fips-197.pdf
-
-
-
|