Skip to search formSkip to main contentSkip to account menu

Neural cryptography

Known as: PPM, Permutation parity machine, Tree parity machine 
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure ISO/IEC 18000-63 compatible UHF tags have big applications and advantages in present-day logistics or transportation… 
2015
2015
In this paper, a detail analysis of Tree Parity Machine (TPM) and Double Hidden Layer Perceptron (DHLP) based session key… 
2013
2013
Key exchange is one of the major concerns in cryp-tology. Neural cryptography is a recent non-classical paradigm which achieves… 
2011
2011
In this paper, a genetic secret key based technique for neural encryption (AGKNE) has been proposed for online transmission of… 
Review
2008
Review
2008
The paper gives an overview of the security issue on WiMAX, which is a new and hot research point for telecommunication and… 
2006
2006
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the… 
2004
2004
In this paper we analyze the security of neural cryptography, a novel key-exchange protocol based on synchronization of neural… 
Review
2004
Review
2004
Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security…