Using neural network in cryptography

被引:0
|
作者
Volná, E [1 ]
机构
[1] Univ Ostrava, Ostrava 70103 1, Czech Republic
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper deals with using neural network in cryptograpy, e.g. designing such neural network, that would be practically used in the area of cryptograpy both in cryptography and cryptoanalysis. The method should be fully independent on the frequency analyse in the text. Thus, it means: to design the topology of the neural network to design the method of training algorithm of the neural network to design the training set for training.
引用
收藏
页码:262 / 267
页数:6
相关论文
共 50 条
  • [21] A Novel Encryption Model for Text Messages using Delayed Chaotic Neural Network and DNA Cryptography
    Roy, Sudipta Singha
    Shahriyar, Shaikh Akib
    Asaf-Uddowla, Md.
    Alam, Kazi Md. Rokibul
    Morimoto, Yasuhiko
    [J]. 2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2017,
  • [22] Neural Network Architecture Selection Analysis With Application to Cryptography Location
    Wright, Jason L.
    Manic, Milos
    [J]. 2010 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS IJCNN 2010, 2010,
  • [23] A known-energy neural network approach for visual cryptography
    Yue, TW
    Chiang, SC
    [J]. IJCNN'01: INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, PROCEEDINGS, 2001, : 2542 - 2547
  • [24] Neural cryptography
    Kinzel, W
    Kanter, I
    [J]. ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 1351 - 1354
  • [25] NETWORK SECURITY USING LATTICE BASED CRYPTOGRAPHY
    Singhla, Sonal
    Yadav, Shailja
    Tanwar, Rohit
    [J]. IIOAB JOURNAL, 2019, 10 (02) : 66 - 71
  • [26] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [27] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Swetha, Gadde
    Janaki, Karur
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (23) : 33971 - 34007
  • [28] Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security
    Kadry, Heba
    Farouk, Ahmed
    Zanaty, Elnomery A.
    Reyad, Omar
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 71 : 491 - 500
  • [29] Multiple Information Hiding in General Access Structure Visual Cryptography Using Q'tron Neural Network
    Gurung, Sandeep
    Chakravorty, Mrinaldeep
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 385 - 394
  • [30] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Gadde Swetha
    Karur Janaki
    [J]. Multimedia Tools and Applications, 2022, 81 : 33971 - 34007