Neural cryptography: Difference between revisions

Content deleted Content added
Rescuing 1 sources and tagging 0 as dead. #IABot (v1.6.2)
OAbot (talk | contribs)
m Open access bot: add arxiv identifier to citation with #oabot.
Line 115:
Other configurations of the output layer for K>2 are also possible.<ref name="Reyes" />
 
This machine has proven to be robust enough against some attacks<ref name="Reyes2">{{cite journal |last1=Reyes |first1=Oscar Mauricio |last2=Zimmermann |first2=Karl-Heinz |date=June 2010 |title=Permutation parity machines for neural cryptography |journal=Physical Review E |volume=81 |issue=6 |issn=1539-3755 |doi=10.1103/PhysRevE.81.066117}}</ref> so it could be used as a cryptographic mean, but it has been shown to be vulnerable to a probabilistic attack.<ref name="Seoane">{{cite journal |last1=Seoane |first1=Luís F. |last2=Ruttor |first2=Andreas |date=February 2012 |title=Successful attack on permutation-parity-machine-based neural cryptography |journal=Physical Review E |volume=85 |issue=2 |issn=1539-3755 |doi=10.1103/PhysRevE.85.025101|arxiv=1111.5792 }}</ref>
 
=== Security against quantum computers ===