Recommendation for key management ? part 1: general (revision 3), National Institute of Standards and Technology Special Publication, pp.800-57, 2012. ,
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
Cryptography, Theory and Practice, 1995. ,
Analysis of Neural Cryptography, Advances in Cryptology -ASIACRYPT 2002, pp.287-298, 2003. ,
DOI : 10.1007/3-540-36178-2_18
Genetic attack on neural cryptography, Genetic Attack on Neural Cryptography, pp.36121-036129, 2006. ,
DOI : 10.1103/PhysRevE.73.036121
Secure exchange of information by synchronization of neural networks, Europhysics Letters (EPL), vol.57, issue.1, pp.141-147, 2002. ,
DOI : 10.1209/epl/i2002-00552-9
The Theory of Neural Networks and Cryptography, Proceeding of the XXII Solvay Conference on Physics, The Physics of Communication, pp.631-644, 2003. ,
Mutual learning in a tree parity machine and its application to cryptography, Physical Review E, vol.66, issue.6, p.66135, 2002. ,
DOI : 10.1103/PhysRevE.66.066135
Synchronization of Neural Networks by Mutual Learning and its Application to Cryptography, Advances in Neural Information Processing Systems, pp.689-696, 2005. ,
Neural Synchronization and Cryptography, 2006. ,
A review on biological inspired computation in cryptology, Jurnal Teknologi Maklumat, vol.17, pp.90-98, 2005. ,
Neuro-Cryptography. MSc Thesis, Dept. of Microcomputers and Microelectronics, 1995. ,
On Application of Neural Networks for S-Boxes Design, LNCS, vol.3528, pp.243-248, 2005. ,
DOI : 10.1007/11495772_38
Design of an efficient neural key distribution center, International Journal of Artificial Intelligence & Applications, vol.2, pp.60-69, 2011. ,
Tree Parity Machine Rekeying Architectures, IEEE Transactions on Computers, vol.54, issue.4, pp.421-427, 2005. ,
DOI : 10.1109/TC.2005.70
URL : http://arxiv.org/abs/cs/0502062
Fundamentals of Artificial Neural Networks, 1995. ,
A logical calculus of the ideas immanent in nervous activity, The Bulletin of Mathematical Biophysics, vol.5, issue.4, pp.115-133, 1943. ,
DOI : 10.1007/BF02478259
Klasyfikacja czasu synchronizacji sieci Tree Parity Machine u?ywanych do uzgadniania kluczy kryptograficznych (in Polish, 2014. ,
Threshold Method of Detecting Long-Time TPM Synchronization, Proceedings of the 12 th International Conference on Computer Information Systems and Industrial Management Applications, pp.241-252, 2013. ,
DOI : 10.1007/978-3-642-40925-7_23
URL : https://hal.archives-ouvertes.fr/hal-01496071
Distribution of the Tree Parity Machine synchronization time, Advances in Science and Technology Research Journal, pp.20-27, 2013. ,
The evaluation of the TPM synchronization on the basis of their outputs, Journal of Achievements in Materials and Manufacturing Engineering, vol.57, pp.91-98, 2013. ,
Distance of tree parity machine initial weights drawn from different distributions, Advances in Science and Technology Research Journal, pp.137-142, 2015. ,
More-or-less-uniform sampling and lengths of curves, Quarterly Of Applied Mathematics, vol.61, pp.475-484, 2003. ,
C-1 interpolation with cumulative chord cubics, Fundamenta Informaticae, pp.285-301, 2004. ,
DOI : 10.1007/1-4020-4179-9_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.9199
Some algorithms for calculating unitary matrices for quantum circuits, Programming and Computer Software, pp.111-116, 2010. ,
DOI : 10.1134/s036176881002009x
Simulation of quantum error correction by means of QuantumCircuit package, Programming and Computer Software, pp.143-149, 2013. ,
Shading without shape, Quarterly of Applied Mathematics, vol.50, issue.1, pp.27-38, 1992. ,
DOI : 10.1090/qam/1146621
Uniqueness in shape from shading revisited, Journal of Mathematical Imaging and Vision, vol.7, issue.2, pp.123-138, 1997. ,
DOI : 10.1023/A:1008249420974
Optical music recognition: the case study of pattern recognition, Computer Recognition Systems, et al. Book Series Advances in Soft Computing, pp.835-842, 2005. ,