• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4595689)   Today's Articles (1805)   Subscriber (49334)
For: Mislovaty R, Perchenok Y, Kanter I, Kinzel W. Secure key-exchange protocol with an absence of injective functions. Phys Rev E Stat Nonlin Soft Matter Phys 2002;66:066102. [PMID: 12513342 DOI: 10.1103/physreve.66.066102] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/12/2002] [Indexed: 05/24/2023]
Number Cited by Other Article(s)
1
Dey J, Bhowmik A. Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic. WIRELESS PERSONAL COMMUNICATIONS 2023;130:1885-1904. [PMID: 37206633 PMCID: PMC10067522 DOI: 10.1007/s11277-023-10362-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 02/25/2023] [Indexed: 05/21/2023]
2
Dey J. State-of-the-art session key generation on priority-based adaptive neural machine (PANM) in telemedicine. Neural Comput Appl 2023;35:9517-9533. [PMID: 37077617 PMCID: PMC10032630 DOI: 10.1007/s00521-022-08169-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/31/2022] [Accepted: 12/06/2022] [Indexed: 03/24/2023]
3
Stypinski M, Niemiec M. Synchronization of Tree Parity Machines Using Nonbinary Input Vectors. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2022;PP:1423-1429. [PMID: 35696483 DOI: 10.1109/tnnls.2022.3180197] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
4
Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions. EURASIP JOURNAL ON INFORMATION SECURITY 2018. [DOI: 10.1186/s13635-018-0073-z] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]  Open
5
Seoane LF, Ruttor A. Successful attack on permutation-parity-machine-based neural cryptography. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2012;85:025101. [PMID: 22463268 DOI: 10.1103/physreve.85.025101] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/20/2011] [Indexed: 05/31/2023]
6
Reyes OM, Zimmermann KH. Permutation parity machines for neural cryptography. Phys Rev E 2010;81:066117. [PMID: 20866488 DOI: 10.1103/physreve.81.066117] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/27/2010] [Indexed: 11/07/2022]
7
Arvandi M, Wu S, Sadeghian A. On the use of recurrent neural networks to design symmetric ciphers. IEEE COMPUT INTELL M 2008. [DOI: 10.1109/mci.2008.919075] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
8
Ruttor A, Kinzel W, Kanter I. Dynamics of neural cryptography. Phys Rev E 2007;75:056104. [PMID: 17677130 DOI: 10.1103/physreve.75.056104] [Citation(s) in RCA: 40] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/21/2006] [Indexed: 11/07/2022]
9
Ruttor A, Kinzel W, Naeh R, Kanter I. Genetic attack on neural cryptography. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2006;73:036121. [PMID: 16605612 DOI: 10.1103/physreve.73.036121] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/01/2005] [Indexed: 05/08/2023]
10
Shacham LN, Klein E, Mislovaty R, Kanter I, Kinzel W. Cooperating attackers in neural cryptography. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2004;69:066137. [PMID: 15244697 DOI: 10.1103/physreve.69.066137] [Citation(s) in RCA: 13] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/01/2003] [Indexed: 05/24/2023]
11
Ruttor A, Kinzel W, Shacham L, Kanter I. Neural cryptography with feedback. PHYSICAL REVIEW. E, STATISTICAL, NONLINEAR, AND SOFT MATTER PHYSICS 2004;69:046110. [PMID: 15169072 DOI: 10.1103/physreve.69.046110] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/26/2003] [Indexed: 05/24/2023]
12
Mislovaty R, Klein E, Kanter I, Kinzel W. Public channel cryptography by synchronization of neural networks and chaotic maps. PHYSICAL REVIEW LETTERS 2003;91:118701. [PMID: 14525461 DOI: 10.1103/physrevlett.91.118701] [Citation(s) in RCA: 15] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/04/2003] [Indexed: 05/24/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA