Jirí Giesl

Learn More
This work deals with the design of secure communication protocol based on neural network synchronization. Protocol is built on the application-layer of the OSI upon TCP/IP. Server and each connected client must create special type of neural network called Tree Parity Machine then compute outputs of their neural networks and iteratively exchange those(More)
—It is commonly known that chaotic systems are extremely sensitive to initial parameters and these systems can be very helpful in the field of cryptography from this reason. Logistic maps of deterministic chaos can be used for the generation of encryption key. This key is then used for the image encryption. This paper proposes usage of chaotic encryption(More)
  • 1