A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks
This article discusses one of the ways to generate a common cryptographic key using synchronized artificial neural networks. This option is based on a combined method of forming a cryptographic key [1]. The proposed combined formation consists of two stages: the formation of partially coinciding bin...
Saved in:
Main Author: | M. L. Radziukevich |
---|---|
Format: | Article |
Language: | English |
Published: |
Belarusian National Technical University
2021-10-01
|
Series: | Системный анализ и прикладная информатика |
Subjects: | |
Online Access: | https://sapi.bntu.by/jour/article/view/523 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Generation a shared secret using artificial neural networks
by: U. F. Holikau, et al.
Published: (2019-08-01) -
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
by: Daniel Cervantes‐Vázquez, et al.
Published: (2021-09-01) -
The influence of the time of single photon transmission of information on the reliability of its reception in a quantum cryptographic communication channel
by: A. M. Timofeev
Published: (2019-07-01) -
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
by: Alireza Abdellahi Khorasgani, et al.
Published: (2023-07-01) -
Private feasible solution determination
by: Xue Ge, et al.
Published: (2021-01-01)