Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,969,262 papers from all fields of science
Search
Sign In
Create Free Account
Neural cryptography
Known as:
PPM
, Permutation parity machine
, Tree parity machine
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Artificial neural network
Backpropagation
Chaos communications
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Symmetric encryption with key distribution based on neural networks
I. Anikin
,
A. Makhmutova
,
O. E. Gadelshin
International Conference on Industrial…
2016
Corpus ID: 22157552
In this paper, a symmetric encryption approach with key distribution based on artifitial neural networks (ANN) has been…
Expand
2015
2015
Secure and interference-robust ISO/IEC 18000-63 compatible UHF-RFID tags by cryptographic authentication primitives
S. Wallner
,
Klaus Finkenzeller
International Journal of Radio Frequency…
2015
Corpus ID: 38076482
Secure ISO/IEC 18000-63 compatible UHF tags have big applications and advantages in present-day logistics or transportation…
Expand
2011
2011
An adaptive genetic key based neural encryption for online wireless communication (AGKNE)
J. K. Mandal
,
Arindam Sarkar
International Conference on Recent Trends in…
2011
Corpus ID: 13401215
In this paper, a genetic secret key based technique for neural encryption (AGKNE) has been proposed for online transmission of…
Expand
2011
2011
Secure Group Communication in Ad-Hoc Networks using Tree Parity Machines
B. Saballus
,
M. Volkmer
,
S. Wallner
2011
Corpus ID: 18113751
A fundamental building block of secure group communication is the establishment of a common group key. This can be divided into…
Expand
2008
2008
Secure communication in microcomputer bus systems for embedded devices
Sascha Mühlbach
,
S. Wallner
Journal of systems architecture
2008
Corpus ID: 38326928
Review
2008
Review
2008
Security Research on WiMAX with Neural Cryptography
Dong Hu
,
Yuyan Wang
International Symposium on Algorithms
2008
Corpus ID: 18120262
The paper gives an overview of the security issue on WiMAX, which is a new and hot research point for telecommunication and…
Expand
2006
2006
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
M. Volkmer
IACR Cryptology ePrint Archive
2006
Corpus ID: 18047538
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the…
Expand
2005
2005
Tree Parity Machine Rekeying Architectures for Embedded Security
M. Volkmer
,
S. Wallner
IACR Cryptology ePrint Archive
2005
Corpus ID: 34104465
2005
2005
A Key Establishment IP-Core for Ubiquitous Computing
M. Volkmer
,
S. Wallner
International Conference on Database and Expert…
2005
Corpus ID: 9002379
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure…
Expand
Review
2004
Review
2004
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
M. Volkmer
,
S. Wallner
GI Jahrestagung
2004
Corpus ID: 5190434
Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE