ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Neural cryptography

Journal: VOJNOTEHNICKI GLASNIK / MILITARY TECHNICAL COURIER (Vol.64, No. 2)

Publication Date:

Authors : ;

Page : 483-495

Keywords : Tree parity machine; Neural networks; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Neural cryptography based on the tree parity machine (TPM) is presented in this paper. A mutual learning-based synchronization of two networks is studied. The training of the TPM based on the Hebbian, anti-Hebbian and random walk as well as on the secure key generation protocol is described. The most important attacks on the key generation process are shown.

Last modified: 2016-10-25 01:37:21