메뉴 건너뛰기




Volumn 2, Issue , 2010, Pages

Design of S-boxes based on neural networks

Author keywords

Block ciphers; Cryptographic properties; Neural network; S box design

Indexed keywords

ACTIVATION FUNCTIONS; BLOCK CIPHERS; CIPHERTEXTS; CRYPTOGRAPHIC PROPERTIES; ERROR BACK PROPAGATION; HIDDEN LAYERS; INITIAL VALUES; INPUT AND OUTPUTS; INPUT LAYERS; INPUT VALUES; INPUT VECTOR; NON-LINEARITY; NONLINEAR FUNCTIONS; OUTPUT BITS; OUTPUT LAYER; S-BOX DESIGN; S-BOXES; STRICT AVALANCHE; TRAINING SETS;

EID: 78049325075     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEIE.2010.5559741     Document Type: Conference Paper
Times cited : (11)

References (21)
  • 1
    • 3342923348 scopus 로고
    • Neural networks and their cryptographic applications
    • D. Pointcheval, "Neural Networks and Their Cryptographic Applications," in Proc. of Eurocode, pp. 183-193, 1994.
    • (1994) Proc. of Eurocode , pp. 183-193
    • Pointcheval, D.1
  • 2
    • 0032687653 scopus 로고    scopus 로고
    • A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks
    • D. Guo, L.M. Cheng and L.L. Cheng, "A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks," Applied Intelligence, vol. 10, no. 1, pp. 71-84, 1999.
    • (1999) Applied Intelligence , vol.10 , Issue.1 , pp. 71-84
    • Guo, D.1    Cheng, L.M.2    Cheng, L.L.3
  • 3
    • 2342565045 scopus 로고    scopus 로고
    • Design and realization of a new chaotic neural encryption/decryption network
    • S. Su, A. Lin, and J. Yen, "Design and realization of a new chaotic neural encryption/decryption network," IEEE Asia-Pacific Conf. Cir. & Syst., pp. 335-338, 2000.
    • (2000) IEEE Asia-pacific Conf. Cir. & Syst. , pp. 335-338
    • Su, S.1    Lin, A.2    Yen, J.3
  • 4
    • 0035271446 scopus 로고    scopus 로고
    • The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
    • March
    • C. Chi-Kwong, L.M. Cheng, "The convergence properties of a clipped Hopfield network and its application in the design of keystream generator," IEEE Trans. Neural Networks, vol. 12, no. 2, pp. 340-348, March 2001.
    • (2001) IEEE Trans. Neural Networks , vol.12 , Issue.2 , pp. 340-348
    • Chi-Kwong, C.1    Cheng, L.M.2
  • 8
    • 34248366641 scopus 로고    scopus 로고
    • A combined hash and encryption scheme by chaotic neural network
    • D. Xiao and X. Liao, "A Combined Hash and Encryption Scheme by Chaotic Neural Network," Proc. Int'l Sym. Neural Nets 2004, vol. 2, pp. 633-638, 2004.
    • (2004) Proc. Int'l Sym. Neural Nets 2004 , vol.2 , pp. 633-638
    • Xiao, D.1    Liao, X.2
  • 9
    • 24944547508 scopus 로고    scopus 로고
    • Chosen-plaintext cryptanalysis of a clipped-neural network- based chaotic cipher
    • Li, C., "Chosen-plaintext cryptanalysis of a clipped-neural network- based chaotic cipher," Advances in Neural Networks-ISNN 2005, pp. 630-636, 2005.
    • (2005) Advances in Neural Networks-ISNN 2005 , pp. 630-636
    • Li, C.1
  • 10
    • 33748433928 scopus 로고    scopus 로고
    • Secure hash function based on neural network
    • DOI 10.1016/j.neucom.2006.04.003, PII S0925231206001159, Brain Inspired Cognitive Systems Selected papers from the 1st International Conference on Brain Inspired Cognitive Systems (BICS 2004)
    • Lian, S., J. Sun, and Z. Wang, "Secure hash function based on neural network," Neurocomputing 69, pp. 2346- 2350, 2006, doi:10.1016/j.neucom. 2006.04.003. (Pubitemid 44340609)
    • (2006) Neurocomputing , vol.69 , Issue.16-18 , pp. 2346-2350
    • Lian, S.1    Sun, J.2    Wang, Z.3
  • 11
    • 34848843470 scopus 로고    scopus 로고
    • A neural key generator for a public block cipher
    • A. Guerreiro, and C. Araujo, "A Neural Key Generator for a Public Block Cipher," in Proc. of SBRN'06, pp. 143-147, 2006.
    • (2006) Proc. of SBRN'06 , pp. 143-147
    • Guerreiro, A.1    Araujo, C.2
  • 13
    • 42949131129 scopus 로고    scopus 로고
    • On the use of recurrent neural networks to design symmetric ciphers
    • Arvandi, M., S. Wu, and A. Sadeghian, "On the use of recurrent neural networks to design symmetric ciphers," IEEE computational intelligence magazine, Vol. 3, pp. 42-53, 2008.
    • (2008) IEEE Computational Intelligence Magazine , vol.3 , pp. 42-53
    • Arvandi, M.1    Wu, S.2    Sadeghian, A.3
  • 14
    • 58149460651 scopus 로고    scopus 로고
    • A block cipher based on chaotic neural networks
    • S. Lian, "A block cipher based on chaotic neural networks," journal of Neurocomputing, Vol. 72, pp. 1296-1301, 2009.
    • (2009) Journal of Neurocomputing , vol.72 , pp. 1296-1301
    • Lian, S.1
  • 19
    • 0018530910 scopus 로고
    • Structured design of substitution-permutation encryption networks
    • J. Kam, and G. Davida, "Structured design of substitution- permutation encryption networks," IEEE Transactions on Computers, Vol. 100, no. 28, pp. 747- 753, 1979.
    • (1979) IEEE Transactions on Computers , vol.100 , Issue.28 , pp. 747-753
    • Kam, J.1    Davida, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.