* [http://s.dourlens.free.fr/AppliedNeuroCryptography.pdf Neuro-Cryptography] 1995 - The first definition of the Neuro-Cryptography (AI Neural-Cryptography) applied to DES cryptanalysis by Sebastien Dourlens, France.
* [http://theorie.physik.uni-wuerzburg.de/~ruttor/neurocrypt.html Neural Cryptography] - Description of one kind of neural cryptography at the [[University of Würzburg]], Germany.
* {{cite conference |last1=Kinzel |first1=W. |last2=Kanter |first2=I. |date=2002 |title=Neural cryptography |book-title=Proceedings of the 9th International Conference on Neural Information Processing |conference=ICONIP '02 |pages=1351–1354 |doi=10.1109/ICONIP.2002.1202841}} - One of the leading papers that introduce the concept of using synchronized neural networks to achieve a public key authentication system.
* [http://ieeexplore.ieee.org/Xplore/defdeny.jsp?url=/iel5/8534/27062/01202841.pdf?tp=&tp=x&arnumber=1202841&isnumber=27062&code=4 Using synchronized neural networks to achieve public key authentication system] - One of the leading papers that introduce the concept.
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber{{cite journal |last1=963786Li |first1=Li-Hua |last2=Lin |first2=Luon-Chang |last3=Hwang |first3=Min-Shiang |date=November 2001 |title=A remote password authentication scheme for multiserverarchitecturemultiserver architecture using neural networks] |journal=IEEE Transactions on Neural Networks |volume=12 |issue=6 |pages=1498–1504 |issn=1045-9227 |doi=10.1109/72.963786}} - Possible practical application of Neural Cryptography.
* [http://www.springerlink.com/content/kbpxkbnkgtk4ymhh/{{cite conference |last1=Klimov |first1=Alexander |last2=Mityagin |first2=Anton |last3=Shamir |first3=Adi |date=2002 |title=Analysis of Neural Cryptography |book-title=Advances in Cryptology |conference=ASIACRYPT 2002 |series=[[Lecture Notes in Computer Science|LNCS]] |volume=2501 |pages=288–298 |issn=0302-9743 |doi=10.1007/3-540-36178-2_18}} - Analysis of neural cryptography in general and focusing on the weakness and possible attacks of using synchronized neural networks.
* [http://www.opus-bayern.de/uni-wuerzburg/volltexte/2007/2361/ Neural Synchronization and Cryptography] - Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universität Würzburg, 2006.
* {{cite journal |author1last1=Ruttor |first1=Andreas Ruttor|last2=Kinzel |author2first2=Wolfgang Kinzel|last3=Naeh |author3first3=Rivka Naeh|last4=Kanter |author4first4=Ido Kanter|date=March 2006 |last-author-amptitle=yesGenetic attack on neural cryptography |journal=Physical yearReview E |volume=200673 |issue=3 |issn=1539-3755 |doi=10.1103/PhysRevE.73.036121}}
title=Genetic attack on neural cryptography | journal=Physical Review E | url=http://link.aps.org/abstract/PRE/v73/e036121| doi = 10.1103/PhysRevE.73.036121 | volume=73}}
* {{cite journal | author=Khalil Shihab | year=2006 |
title=A backpropagation neural network for computer network security | journal=Journal of Computer Science 2 | pages=710–715 | url=http://www.scipub.org/fulltext/jcs/jcs29710-715.pdf}}
|