Neural cryptography: Difference between revisions

Content deleted Content added
Line 141:
* {{cite conference |last1=Kinzel |first1=W. |last2=Kanter |first2=I. |date=2002 |title=Neural cryptography |book-title=Proceedings of the 9th International Conference on Neural Information Processing |conference=ICONIP '02 |pages=1351–1354 |doi=10.1109/ICONIP.2002.1202841}} - One of the leading papers that introduce the concept of using synchronized neural networks to achieve a public key authentication system.
* {{cite journal |last1=Li |first1=Li-Hua |last2=Lin |first2=Luon-Chang |last3=Hwang |first3=Min-Shiang |date=November 2001 |title=A remote password authentication scheme for multiserver architecture using neural networks |journal=IEEE Transactions on Neural Networks |volume=12 |issue=6 |pages=1498–1504 |issn=1045-9227 |doi=10.1109/72.963786}} - Possible practical application of Neural Cryptography.
* {{cite conference |last1=Klimov |first1=Alexander |last2=Mityagin |first2=Anton |last3=Shamir |first3=Adi |date=2002 |title=Analysis of Neural Cryptography |url=https://iacr.org/archive/asiacrypt2002/25010286/25010286.pdf |book-title=Advances in Cryptology |conference=ASIACRYPT 2002 |series=[[Lecture Notes in Computer Science|LNCS]] |volume=2501 |pages=288–298 |issn=0302-9743 |doi=10.1007/3-540-36178-2_18 |accessdate=2017-11-15}} - Analysis of neural cryptography in general and focusing on the weakness and possible attacks of using synchronized neural networks.
* [http://www.opus-bayern.de/uni-wuerzburg/volltexte/2007/2361/ Neural Synchronization and Cryptography] - Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universität Würzburg, 2006.
* {{cite journal |last1=Ruttor |first1=Andreas |last2=Kinzel |first2=Wolfgang |last3=Naeh |first3=Rivka |last4=Kanter |first4=Ido |date=March 2006 |title=Genetic attack on neural cryptography |journal=Physical Review E |volume=73 |issue=3 |issn=1539-3755 |doi=10.1103/PhysRevE.73.036121}}