Martin Javurek

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
One of the problems of cryptography based on the tree parity machine is how to recognize that two tree parity machines are synchronized. In this paper, one of the possible solutions based on polynomial function is described. The proposed method is focused on obtaining of one unique number by polynomial function. Consequently, two possible forms of an attack(More)
Effective generation of hash function is very important for an achievement of a security of today networks. A cryptographic hash function is a transformation that takes an input and returns a fixed-size value, which is called the hash value. An artificial neural network (ANN), as a possible approach, could be used for the hash function generation. The(More)
  • 1