These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
91 related articles for article (PubMed ID: 15714606)
1. Step to improve neural cryptography against flipping attacks. Zhou J; Xu Q; Pei W; He Z; Szu H Int J Neural Syst; 2004 Dec; 14(6):393-405. PubMed ID: 15714606 [TBL] [Abstract][Full Text] [Related]
2. Cooperating attackers in neural cryptography. Shacham LN; Klein E; Mislovaty R; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Jun; 69(6 Pt 2):066137. PubMed ID: 15244697 [TBL] [Abstract][Full Text] [Related]
3. On the improvement of neural cryptography using erroneous transmitted information with error prediction. Allam AM; Abbas HM IEEE Trans Neural Netw; 2010 Dec; 21(12):1915-24. PubMed ID: 20937580 [TBL] [Abstract][Full Text] [Related]
4. Dynamics of neural cryptography. Ruttor A; Kinzel W; Kanter I Phys Rev E Stat Nonlin Soft Matter Phys; 2007 May; 75(5 Pt 2):056104. PubMed ID: 17677130 [TBL] [Abstract][Full Text] [Related]
5. Secure key-exchange protocol with an absence of injective functions. Mislovaty R; Perchenok Y; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):066102. PubMed ID: 12513342 [TBL] [Abstract][Full Text] [Related]
6. Approach to design neural cryptography: a generalized architecture and a heuristic rule. Mu N; Liao X; Huang T Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726 [TBL] [Abstract][Full Text] [Related]
7. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography. Coutinho M; de Oliveira Albuquerque R; Borges F; GarcĂa Villalba LJ; Kim TH Sensors (Basel); 2018 Apr; 18(5):. PubMed ID: 29695066 [TBL] [Abstract][Full Text] [Related]
8. Genetic attack on neural cryptography. Ruttor A; Kinzel W; Naeh R; Kanter I Phys Rev E Stat Nonlin Soft Matter Phys; 2006 Mar; 73(3 Pt 2):036121. PubMed ID: 16605612 [TBL] [Abstract][Full Text] [Related]
9. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Chen H; Ge L; Xie L Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224 [TBL] [Abstract][Full Text] [Related]
10. Public channel cryptography by synchronization of neural networks and chaotic maps. Mislovaty R; Klein E; Kanter I; Kinzel W Phys Rev Lett; 2003 Sep; 91(11):118701. PubMed ID: 14525461 [TBL] [Abstract][Full Text] [Related]
11. Consensus-based distributed cooperative learning from closed-loop neural control systems. Chen W; Hua S; Zhang H IEEE Trans Neural Netw Learn Syst; 2015 Feb; 26(2):331-45. PubMed ID: 25608294 [TBL] [Abstract][Full Text] [Related]
12. Polynomial harmonic GMDH learning networks for time series modeling. Nikolaev NY; Iba H Neural Netw; 2003 Dec; 16(10):1527-40. PubMed ID: 14622880 [TBL] [Abstract][Full Text] [Related]
13. Public-channel cryptography using chaos synchronization. Klein E; Mislovaty R; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2005 Jul; 72(1 Pt 2):016214. PubMed ID: 16090073 [TBL] [Abstract][Full Text] [Related]
14. An improvement of extreme learning machine for compact single-hidden-layer feedforward neural networks. Huynh HT; Won Y; Kim JJ Int J Neural Syst; 2008 Oct; 18(5):433-41. PubMed ID: 18991365 [TBL] [Abstract][Full Text] [Related]
15. The labeled systems of multiple neural networks. Nemissi M; Seridi H; Akdag H Int J Neural Syst; 2008 Aug; 18(4):321-30. PubMed ID: 18763731 [TBL] [Abstract][Full Text] [Related]
16. Binary neural network training algorithms based on linear sequential learning. Wang D; Chaudhari NS Int J Neural Syst; 2003 Oct; 13(5):333-51. PubMed ID: 14652874 [TBL] [Abstract][Full Text] [Related]
17. Cluster synchronization in an array of hybrid coupled neural networks with delay. Cao J; Li L Neural Netw; 2009 May; 22(4):335-42. PubMed ID: 19372028 [TBL] [Abstract][Full Text] [Related]
18. Neural Cryptography Based on Complex-Valued Neural Network. Dong T; Huang T IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4999-5004. PubMed ID: 31880562 [TBL] [Abstract][Full Text] [Related]
19. Mutual learning in a tree parity machine and its application to cryptography. Rosen-Zvi M; Klein E; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):066135. PubMed ID: 12513375 [TBL] [Abstract][Full Text] [Related]
20. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. Lu Y; Li L; Peng H; Yang Y J Med Syst; 2015 Mar; 39(3):32. PubMed ID: 25681101 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]