Neural cryptography: Difference between revisions

Content deleted Content added
m clean up, typo(s) fixed: Therefore → Therefore, using AWB
Line 65:
:<math>w_i^+=w_i-\sigma_ix_i\Theta(\sigma_i\tau)\Theta(\tau^A\tau^B)</math>
* Random walk:
:<math>w_i^+=g(w_i+x_i\Theta(\sigma_i\tau)\Theta(\tau^A\tau^B))</math>
 
=== Attacks and security of this protocol ===