2008 Eighth International Conference on Intelligent Systems Design and Applications 2008
DOI: 10.1109/isda.2008.267
|View full text |Cite
|
Sign up to set email alerts
|

The Improvement of Public Key Cryptography Based on Chaotic Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Other uses for Chaos NNs is pseudo random number generations using a peice wise linear chaotic map [165,166]. Besides using chaotic maps for pseudo random generation, it is also being used in research in conjunction with S-boxes in order to improve upon public key cryptography [167,168], while encryption via NNs may be possible, a comparison with AES shows it provides better performance at the cost of security for larger files [169]. -Genetic Algorithms: Genetic algorithms are heuristics based of the theory of evolution where the best performing individuals will be used to create the next generation of individuals for further optimization in the hopes to converge to an optimization.…”
Section: -Neural Physically Unclonable Function (Puf)mentioning
confidence: 99%
“…Other uses for Chaos NNs is pseudo random number generations using a peice wise linear chaotic map [165,166]. Besides using chaotic maps for pseudo random generation, it is also being used in research in conjunction with S-boxes in order to improve upon public key cryptography [167,168], while encryption via NNs may be possible, a comparison with AES shows it provides better performance at the cost of security for larger files [169]. -Genetic Algorithms: Genetic algorithms are heuristics based of the theory of evolution where the best performing individuals will be used to create the next generation of individuals for further optimization in the hopes to converge to an optimization.…”
Section: -Neural Physically Unclonable Function (Puf)mentioning
confidence: 99%
“…During the BP (for the decoder-stage only), the same data sample is delivered also to the decoder as desired target ''p i '' as step (5) of same algorithm 3. According to the instant-ML of the learning ratios (that introduced in introduction part), each desired target intersects with its corresponding neuron function-curve to produce new ''Pre activation new '' for each neuron ''i'' of the outputlayer ''op'' as formula (8 and 9).…”
Section: Encryptor-unit Of the Lite-ihncmentioning
confidence: 99%
“…In the past two decades, many researchers already have collected and combined different NNs with various classical cryptographic paradigms [4]. The designers invented many complex neurocryptography rules [5][6][7]. They have created their CA by using different learning algorithms to generate strong keys [8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%