[1] |
Kinzel W, Kanter I. Interacting neural networks and cryptography[J]. Advances in Solid State Physics, 2002, 42:383-391.
|
[2] |
Rosen-Zvi M, Kanter I, Kinzel W. Cryptography based on neural networks-analytical results[J]. Journal of Physics A: Mathematical and General, 2002,35(47):L707-L713.
|
[3] |
Ruttor A, Kinzel W, Shacham L, et al. Neural cryptography with feedback[J]. Physics Review E, 2004,69(6):046110.
|
[4] |
Ruttor A, Kinzel W, Kanter I. Neural cryptography with queries[J]. Journal Statistical Mechanics:Theory and Experiment, 2005(1):P01009.
|
[5] |
Rosen-Zvi M, Klein E, Kanter I, et al. Mutual learning in a tree parity machine and its application to cryptography[J]. Physical Review E, 2002,66(6):066135.
|
[6] |
Kinzel W. Theory of Interacting Neural Networks[DB/OL]. http://onlinelibrary.wiley.com/doi/10.1002/3527602755.ch9/summary, 2002-04-02.
|
[7] |
Kinzel W, Kanter I. Disorder generated by interacting neural networks: Application to econophysics and cryptography[J]. Journal of Physics A: Mathematical and General, 2003,36(43):11173-11186.
|
[8] |
Kanter I, Kinzel W, Kanter E. Secure exchange of information by synchronization of neural networks[J]. Europhysics Letters, 2002,57(1):141-147.
|
[9] |
Klimov A, Mityaguine A, Shamir A. Analysis of neural cryptography[J]. Lecture Notes in Computer Science, 2002,2501:288-298.
|
[10] |
Shacham L N, Klein E, Mislovaty R, et al. Cooperating attackers in neural cryptography[J]. Physics Review E, 2004,69(6):066137.
|
[11] |
Ruttor A, Kinzel W, Naeh T, et al. Genetic attack on neural cryptography[J]. Physics Review E, 2006,73(3):036121.
|
[12] |
Mislovaty R, Perchenok Y, Kanter I, et al. Secure key-exchange protocol with an absence of injective functions[J]. Physics Review E, 2002,66(6):066102.
|
[13] |
Bornholdt S, Schuster H G. Handbook of Graphs and Networks: From the Genome to the Internet[M]. John Wiley & Sons, 2003.
|
[14] |
Kinzel W, Kanter I. Neural cryptography[C]// Proceedings of the 9th International Conference on Neural Information Processing. 2002,3:1351-1354.
|
[15] |
田勇,向涛. 神经网路同步的判定及在神经密码中的应用[J]. 计算机工程与应用, 2011,47(36):109-111,186.
|
[16] |
Engel A, Van den Broeck C. Statistical Mechanics of Learning[M]. Cambridge University Press, 2001.
|
[17] |
Kinzel W, Metzler R, Kanter I. Dynamics of interacting neural networks[J]. Journal of Physics A: Mathematical and General, 2000,33(14):L141-L147.
|
[18] |
Volkmer M, Wallner S. Tree parity machine Rekeying architectures[J]. IEEE Transactions on Computers, 2005,54(4):421-427.
|
[19] |
Volkmer M, Wallner S. Lightweight key exchange and stream cipher based solely on tree parity machines[C]// ECRYPT Work-shop on RFID and Lightweight Crypto. 2005:102-113.
|