-
1
-
-
3342923348
-
Neural networks and their cryptographic applications
-
D. Pointcheval, "Neural Networks and Their Cryptographic Applications," in Proc. of Eurocode, pp. 183-193, 1994.
-
(1994)
Proc. of Eurocode
, pp. 183-193
-
-
Pointcheval, D.1
-
2
-
-
0032687653
-
A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks
-
D. Guo, L.M. Cheng and L.L. Cheng, "A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks," Applied Intelligence, vol. 10, no. 1, pp. 71-84, 1999.
-
(1999)
Applied Intelligence
, vol.10
, Issue.1
, pp. 71-84
-
-
Guo, D.1
Cheng, L.M.2
Cheng, L.L.3
-
3
-
-
2342565045
-
Design and realization of a new chaotic neural encryption/decryption network
-
S. Su, A. Lin, and J. Yen, "Design and realization of a new chaotic neural encryption/decryption network," IEEE Asia-Pacific Conf. Cir. & Syst., pp. 335-338, 2000.
-
(2000)
IEEE Asia-pacific Conf. Cir. & Syst.
, pp. 335-338
-
-
Su, S.1
Lin, A.2
Yen, J.3
-
4
-
-
0035271446
-
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
-
March
-
C. Chi-Kwong, L.M. Cheng, "The convergence properties of a clipped Hopfield network and its application in the design of keystream generator," IEEE Trans. Neural Networks, vol. 12, no. 2, pp. 340-348, March 2001.
-
(2001)
IEEE Trans. Neural Networks
, vol.12
, Issue.2
, pp. 340-348
-
-
Chi-Kwong, C.1
Cheng, L.M.2
-
5
-
-
0036086002
-
Application of multilayer perceptron network as a oneway hash function
-
L.P. Yee, and L.C. De Silva, "Application of multilayer perceptron network as a oneway hash function," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1459-1462, 2002.
-
(2002)
Proc of the International Joint Conference on Neural Network
, vol.2
, pp. 1459-1462
-
-
Yee, L.P.1
De Silva, L.C.2
-
6
-
-
0036079845
-
Application of multilayer perceptron networks in symmetric block ciphers
-
L.P. Yee, and L.C. De Silva, "Application of multilayer perceptron networks in symmetric block ciphers," in Proc. of the International Joint Conference on Neural Network, vol. 2, pp. 1455-1458, 2002.
-
(2002)
Proc. of the International Joint Conference on Neural Network
, vol.2
, pp. 1455-1458
-
-
Yee, L.P.1
De Silva, L.C.2
-
7
-
-
84968561534
-
Neural cryptography
-
W. Kinzel, and I. Kanter, "Neural Cryptography," Proc. of the 9th Int'l Conf. on Neural Information Processing (ICONIP'02), vol. 3, pp. 1351-1354, 2002.
-
(2002)
Proc. of the 9th Int'l Conf. on Neural Information Processing (ICONIP'02)
, vol.3
, pp. 1351-1354
-
-
Kinzel, W.1
Kanter, I.2
-
8
-
-
34248366641
-
A combined hash and encryption scheme by chaotic neural network
-
D. Xiao and X. Liao, "A Combined Hash and Encryption Scheme by Chaotic Neural Network," Proc. Int'l Sym. Neural Nets 2004, vol. 2, pp. 633-638, 2004.
-
(2004)
Proc. Int'l Sym. Neural Nets 2004
, vol.2
, pp. 633-638
-
-
Xiao, D.1
Liao, X.2
-
9
-
-
24944547508
-
Chosen-plaintext cryptanalysis of a clipped-neural network- based chaotic cipher
-
Li, C., "Chosen-plaintext cryptanalysis of a clipped-neural network- based chaotic cipher," Advances in Neural Networks-ISNN 2005, pp. 630-636, 2005.
-
(2005)
Advances in Neural Networks-ISNN 2005
, pp. 630-636
-
-
Li, C.1
-
10
-
-
33748433928
-
Secure hash function based on neural network
-
DOI 10.1016/j.neucom.2006.04.003, PII S0925231206001159, Brain Inspired Cognitive Systems Selected papers from the 1st International Conference on Brain Inspired Cognitive Systems (BICS 2004)
-
Lian, S., J. Sun, and Z. Wang, "Secure hash function based on neural network," Neurocomputing 69, pp. 2346- 2350, 2006, doi:10.1016/j.neucom. 2006.04.003. (Pubitemid 44340609)
-
(2006)
Neurocomputing
, vol.69
, Issue.16-18
, pp. 2346-2350
-
-
Lian, S.1
Sun, J.2
Wang, Z.3
-
11
-
-
34848843470
-
A neural key generator for a public block cipher
-
A. Guerreiro, and C. Araujo, "A Neural Key Generator for a Public Block Cipher," in Proc. of SBRN'06, pp. 143-147, 2006.
-
(2006)
Proc. of SBRN'06
, pp. 143-147
-
-
Guerreiro, A.1
Araujo, C.2
-
12
-
-
46549083859
-
Finding the differential characteristics of block ciphers with neural networks
-
Baghi, A., R. Safabakhsh, and B. Sadeghiyan, "Finding the differential characteristics of block ciphers with neural networks," international journal of Information Sciences, pp. 3118-3132, 2008.
-
(2008)
International Journal of Information Sciences
, pp. 3118-3132
-
-
Baghi, A.1
Safabakhsh, R.2
Sadeghiyan, B.3
-
13
-
-
42949131129
-
On the use of recurrent neural networks to design symmetric ciphers
-
Arvandi, M., S. Wu, and A. Sadeghian, "On the use of recurrent neural networks to design symmetric ciphers," IEEE computational intelligence magazine, Vol. 3, pp. 42-53, 2008.
-
(2008)
IEEE Computational Intelligence Magazine
, vol.3
, pp. 42-53
-
-
Arvandi, M.1
Wu, S.2
Sadeghian, A.3
-
14
-
-
58149460651
-
A block cipher based on chaotic neural networks
-
S. Lian, "A block cipher based on chaotic neural networks," journal of Neurocomputing, Vol. 72, pp. 1296-1301, 2009.
-
(2009)
Journal of Neurocomputing
, vol.72
, pp. 1296-1301
-
-
Lian, S.1
-
15
-
-
0003710566
-
-
Prentice-Hall, Inc. Upper Saddle River, NJ, USA
-
L. Fausett, "Fundamentals of neural networks: architectures, algorithms, and applications," Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 1994.
-
(1994)
Fundamentals of Neural Networks: Architectures, Algorithms, and Applications
-
-
Fausett, L.1
-
19
-
-
0018530910
-
Structured design of substitution-permutation encryption networks
-
J. Kam, and G. Davida, "Structured design of substitution- permutation encryption networks," IEEE Transactions on Computers, Vol. 100, no. 28, pp. 747- 753, 1979.
-
(1979)
IEEE Transactions on Computers
, vol.100
, Issue.28
, pp. 747-753
-
-
Kam, J.1
Davida, G.2
-
20
-
-
85020573990
-
On the design of S-boxes
-
LNCS 218, Springer
-
A. Webster, and S. Tavares, "On the design of S-boxes," Advances in cryptology-CRYPT0'85, LNCS 218, pp. 523-534, Springer, 1986.
-
(1986)
Advances in Cryptology-CRYPT0'85
, pp. 523-534
-
-
Webster, A.1
Tavares, S.2
|