Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural network...

Full description

Bibliographic Details
Main Authors: Sooyong Jeong, Cheolhee Park, Dowon Hong, Changho Seo, Namsu Jho
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/6680782