Neural cryptography
Journal: VOJNOTEHNICKI GLASNIK / MILITARY TECHNICAL COURIER (Vol.64, No. 2)Publication Date: 2016-04-01
Authors : Danijela D. Protić;
Page : 483-495
Keywords : Tree parity machine; Neural networks; Cryptography;
Abstract
Neural cryptography based on the tree parity machine (TPM) is presented in this paper. A mutual learning-based synchronization of two networks is studied. The training of the TPM based on the Hebbian, anti-Hebbian and random walk as well as on the secure key generation protocol is described. The most important attacks on the key generation process are shown.
Other Latest Articles
- Las empresas flexibles de autopartes y su localización en el estado de Tlaxcala
- Research into the causes of increased vibration levels on the diesel-electric generators set at the air traffic control: Belgrade Airport
- Negative ions of atoms and diatomic and triatomic molecules
- Choice of the means of transport for the creation of a logistic system relying on uncertainties
Last modified: 2016-10-25 01:37:21