Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,458,491 papers from all fields of science
Search
Sign In
Create Free Account
Neural cryptography
Known as:
PPM
, Permutation parity machine
, Tree parity machine
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Artificial neural network
Backpropagation
Chaos communications
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure and interference-robust ISO/IEC 18000-63 compatible UHF-RFID tags by cryptographic authentication primitives
S. Wallner
,
Klaus Finkenzeller
International Journal of Radio Frequency…
2015
Corpus ID: 38076482
Secure ISO/IEC 18000-63 compatible UHF tags have big applications and advantages in present-day logistics or transportation…
Expand
2015
2015
Comparative Analysis of Tree Parity Machine and Double Hidden Layer Perceptron Based Session Key Exchange in Wireless Communication
Arindam Sarkar
,
J. K. Mandal
2015
Corpus ID: 59805917
In this paper, a detail analysis of Tree Parity Machine (TPM) and Double Hidden Layer Perceptron (DHLP) based session key…
Expand
2013
2013
Authenticated key exchange protocol using neural cryptography with secret boundaries
A. M. Allam
,
H. Abbas
,
M. El-Kharashi
IEEE International Joint Conference on Neural…
2013
Corpus ID: 3089559
Key exchange is one of the major concerns in cryp-tology. Neural cryptography is a recent non-classical paradigm which achieves…
Expand
2011
2011
An adaptive genetic key based neural encryption for online wireless communication (AGKNE)
J. K. Mandal
,
Arindam Sarkar
International Conference on Recent Trends in…
2011
Corpus ID: 13401215
In this paper, a genetic secret key based technique for neural encryption (AGKNE) has been proposed for online transmission of…
Expand
2008
2008
Secure communication in microcomputer bus systems for embedded devices
Sascha Mühlbach
,
S. Wallner
Journal of systems architecture
2008
Corpus ID: 38326928
Review
2008
Review
2008
Security Research on WiMAX with Neural Cryptography
Dong Hu
,
Yuyan Wang
International Symposium on Algorithms
2008
Corpus ID: 18120262
The paper gives an overview of the security issue on WiMAX, which is a new and hot research point for telecommunication and…
Expand
2006
2006
Entity Authentication and Authenticated Key Exchange with Tree Parity Machines
M. Volkmer
IACR Cryptology ePrint Archive
2006
Corpus ID: 18047538
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the…
Expand
2005
2005
Tree Parity Machine Rekeying Architectures for Embedded Security
M. Volkmer
,
S. Wallner
IACR Cryptology ePrint Archive
2005
Corpus ID: 34104465
2004
2004
Security of neural cryptography
Rachel Mislovaty
,
Einat Klein
,
I. Kanter
,
W. Kinzel
Proceedings of the 11th IEEE International…
2004
Corpus ID: 2087632
In this paper we analyze the security of neural cryptography, a novel key-exchange protocol based on synchronization of neural…
Expand
Review
2004
Review
2004
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
M. Volkmer
,
S. Wallner
GI Jahrestagung
2004
Corpus ID: 5190434
Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE