These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
85 related articles for article (PubMed ID: 17677130)
1. Dynamics of neural cryptography. Ruttor A; Kinzel W; Kanter I Phys Rev E Stat Nonlin Soft Matter Phys; 2007 May; 75(5 Pt 2):056104. PubMed ID: 17677130 [TBL] [Abstract][Full Text] [Related]
2. Genetic attack on neural cryptography. Ruttor A; Kinzel W; Naeh R; Kanter I Phys Rev E Stat Nonlin Soft Matter Phys; 2006 Mar; 73(3 Pt 2):036121. PubMed ID: 16605612 [TBL] [Abstract][Full Text] [Related]
3. Neural cryptography with feedback. Ruttor A; Kinzel W; Shacham L; Kanter I Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Apr; 69(4 Pt 2):046110. PubMed ID: 15169072 [TBL] [Abstract][Full Text] [Related]
4. Step to improve neural cryptography against flipping attacks. Zhou J; Xu Q; Pei W; He Z; Szu H Int J Neural Syst; 2004 Dec; 14(6):393-405. PubMed ID: 15714606 [TBL] [Abstract][Full Text] [Related]
5. Mutual learning in a tree parity machine and its application to cryptography. Rosen-Zvi M; Klein E; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):066135. PubMed ID: 12513375 [TBL] [Abstract][Full Text] [Related]
7. Neural Cryptography Based on Complex-Valued Neural Network. Dong T; Huang T IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4999-5004. PubMed ID: 31880562 [TBL] [Abstract][Full Text] [Related]
8. Approach to design neural cryptography: a generalized architecture and a heuristic rule. Mu N; Liao X; Huang T Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726 [TBL] [Abstract][Full Text] [Related]
9. Public channel cryptography by synchronization of neural networks and chaotic maps. Mislovaty R; Klein E; Kanter I; Kinzel W Phys Rev Lett; 2003 Sep; 91(11):118701. PubMed ID: 14525461 [TBL] [Abstract][Full Text] [Related]
10. Secure key-exchange protocol with an absence of injective functions. Mislovaty R; Perchenok Y; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2002 Dec; 66(6 Pt 2):066102. PubMed ID: 12513342 [TBL] [Abstract][Full Text] [Related]
11. Synchronization of Tree Parity Machines Using Nonbinary Input Vectors. Stypinski M; Niemiec M IEEE Trans Neural Netw Learn Syst; 2022 Jun; PP():. PubMed ID: 35696483 [TBL] [Abstract][Full Text] [Related]
12. Successful attack on permutation-parity-machine-based neural cryptography. Seoane LF; Ruttor A Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Feb; 85(2 Pt 2):025101. PubMed ID: 22463268 [TBL] [Abstract][Full Text] [Related]
13. On the improvement of neural cryptography using erroneous transmitted information with error prediction. Allam AM; Abbas HM IEEE Trans Neural Netw; 2010 Dec; 21(12):1915-24. PubMed ID: 20937580 [TBL] [Abstract][Full Text] [Related]
14. Public-channel cryptography using chaos synchronization. Klein E; Mislovaty R; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2005 Jul; 72(1 Pt 2):016214. PubMed ID: 16090073 [TBL] [Abstract][Full Text] [Related]
15. Synchronization of random bit generators based on coupled chaotic lasers and application to cryptography. Kanter I; Butkovski M; Peleg Y; Zigzag M; Aviad Y; Reidler I; Rosenbluh M; Kinzel W Opt Express; 2010 Aug; 18(17):18292-302. PubMed ID: 20721222 [TBL] [Abstract][Full Text] [Related]
16. Cooperating attackers in neural cryptography. Shacham LN; Klein E; Mislovaty R; Kanter I; Kinzel W Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Jun; 69(6 Pt 2):066137. PubMed ID: 15244697 [TBL] [Abstract][Full Text] [Related]
17. Optimal exponential synchronization of general chaotic delayed neural networks: an LMI approach. Liu M Neural Netw; 2009 Sep; 22(7):949-57. PubMed ID: 19443178 [TBL] [Abstract][Full Text] [Related]
19. Concurring of Neural Machines for Robust Session Key Generation and Validation in Telecare Health System During COVID-19 Pandemic. Dey J; Bhowmik A Wirel Pers Commun; 2023; 130(3):1885-1904. PubMed ID: 37206633 [TBL] [Abstract][Full Text] [Related]
20. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Chen H; Ge L; Xie L Sensors (Basel); 2015 Jul; 15(7):17057-75. PubMed ID: 26184224 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]