DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Neural cryptography
Neural cryptography
Exploring Artificial Neural Networks in Cryptography – a Deep Insight
Performance Comparison Between Deep Learning-Based and Conventional Cryptographic Distinguishers
An Efficient Security System Using Neural Networks
Neural Synchronization and Cryptography
Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
A Review of Machine Learning and Cryptography Applications
Neural Synchronization and Cryptography
A Symmetric Key Encryption for Data Integrity Varification Using Artificial Neural Network
An Analysis of Email Encryption Using Neural Cryptography
An Approach to Cryptography Based on Continuous-Variable Quantum
Spiking Neurons with Asnn Based-Methods for The
A Neural Network Implementation of Chaotic Sequences for Data Encryption
Error Correction in Quantum Cryptography Based on Artificial
Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
Application of Machine Learning in DES Cryptanalysis
Analysis of Neural Network Based Ciphers
Analysis of Neural Cryptography
Neural Key Exchange
Top View
Learning to Protect Communications with Adversarial Neural Cryptography
Digital Cryptography Implementation Using Neurocomputational Model with Autoencoder Architecture
Neural Cryptography for Secret Key Exchange
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
Error Correction in Quantum Cryptography Based on Artificial
Probabilistic Attack on Neural Cryptography
Generating Steganographic Images Via Adversarial Training
Generating Steganographic Images Via Adversarial Training
Cryptography Based on Neural Network
Encryption Based on Neural Cryptography
Design of an Efficient Neural Key Distribution Centre
Neural Cryptography for Secure Voice Communication Using Custom Instructions
NEURAL NETWORK BASED CRYPTOGRAPHY 1. Introduction
Review and Recent Trends in Cryptography 1 2 3 VAISHNAVI KANNAN , SMITA JHAJHARIA , DR.SEEMA VERMA
Arxiv:1610.06918V1 [Cs.CR] 21 Oct 2016
Steganalysis and Steganography by Deep Learning Mehdi Yedroudj
Implementation of Hash Function Based on Neural Cryptography
Neural Cryptography Applied to Key Management Protocol with Mutual Authentication in RFID Systems