[1] Kinzel W, Kanter I. Interacting neural networks and cryptography[J]. Advances in Solid State Physics, 2002, 42:383-391.
[2] Rosen-Zvi M, Kanter I, Kinzel W. Cryptography based on neural networks-analytical results[J]. Journal of Physics A: Mathematical and General, 2002,35(47):L707-L713.
[3] Ruttor A, Kinzel W, Shacham L, et al. Neural cryptography with feedback[J]. Physics Review E, 2004,69(6):046110.
[4] Ruttor A, Kinzel W, Kanter I. Neural cryptography with queries[J]. Journal Statistical Mechanics:Theory and Experiment, 2005(1):P01009.
[5] Rosen-Zvi M, Klein E, Kanter I, et al. Mutual learning in a tree parity machine and its application to cryptography[J]. Physical Review E, 2002,66(6):066135.
[6] Kinzel W. Theory of Interacting Neural Networks[DB/OL]. http://onlinelibrary.wiley.com/doi/10.1002/3527602755.ch9/summary, 2002-04-02.
[7] Kinzel W, Kanter I. Disorder generated by interacting neural networks: Application to econophysics and cryptography[J]. Journal of Physics A: Mathematical and General, 2003,36(43):11173-11186.
[8] Kanter I, Kinzel W, Kanter E. Secure exchange of information by synchronization of neural networks[J]. Europhysics Letters, 2002,57(1):141-147.
[9] Klimov A, Mityaguine A, Shamir A. Analysis of neural cryptography[J]. Lecture Notes in Computer Science, 2002,2501:288-298.
[10]Shacham L N, Klein E, Mislovaty R, et al. Cooperating attackers in neural cryptography[J]. Physics Review E, 2004,69(6):066137.
[11]Ruttor A, Kinzel W, Naeh T, et al. Genetic attack on neural cryptography[J]. Physics Review E, 2006,73(3):036121.
[12]Mislovaty R, Perchenok Y, Kanter I, et al. Secure key-exchange protocol with an absence of injective functions[J]. Physics Review E, 2002,66(6):066102.
[13]Bornholdt S, Schuster H G. Handbook of Graphs and Networks: From the Genome to the Internet[M]. John Wiley & Sons, 2003.
[14]Kinzel W, Kanter I. Neural cryptography[C]// Proceedings of the 9th International Conference on Neural Information Processing. 2002,3:1351-1354.
[15]田勇,向涛. 神经网路同步的判定及在神经密码中的应用[J]. 计算机工程与应用, 2011,47(36):109-111,186.
[16]Engel A, Van den Broeck C. Statistical Mechanics of Learning[M]. Cambridge University Press, 2001.
[17]Kinzel W, Metzler R, Kanter I. Dynamics of interacting neural networks[J]. Journal of Physics A: Mathematical and General, 2000,33(14):L141-L147.
[18]Volkmer M, Wallner S. Tree parity machine Rekeying architectures[J]. IEEE Transactions on Computers, 2005,54(4):421-427.
[19]Volkmer M, Wallner S. Lightweight key exchange and stream cipher based solely on tree parity machines[C]// ECRYPT Work-shop on RFID and Lightweight Crypto. 2005:102-113.
|