Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems
Traditional public key exchange protocols are based on algebraic number theory. In another perspective, neural cryptography, which is based on neural networks, has been emerging. It has been reported that two parties can exchange secret key pairs with the synchronization phenomenon in neural network...
Main Authors: | Sooyong Jeong, Cheolhee Park, Dowon Hong, Changho Seo, Namsu Jho |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2021/6680782 |
Similar Items
-
An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack
by: Cheolhee Park, et al.
Published: (2019-01-01) -
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments
by: Cheolhee Park, et al.
Published: (2018-01-01) -
DISTRIBUTION OF THE TREE PARITY MACHINE SYNCHRONIZATION TIME
by: Michał Dolecki, et al.
Published: (2013-06-01) -
On the Linear Transformation in White-Box Cryptography
by: Seungkwang Lee, et al.
Published: (2020-01-01) -
Neural Synchronization and Cryptography
by: Ruttor, Andreas
Published: (2006)