E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendation for key management ? part 1: general (revision 3), National Institute of Standards and Technology Special Publication, pp.800-57, 2012.

A. Menezes, S. Vanstone, and P. Van-oorschot, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

D. R. Stinson, Cryptography, Theory and Practice, 1995.

A. Klimov, A. Mityagin, and A. Shamir, Analysis of Neural Cryptography, Advances in Cryptology -ASIACRYPT 2002, pp.287-298, 2003.
DOI : 10.1007/3-540-36178-2_18

A. Ruttor, W. Kinzel, R. Naeh, and I. Kanter, Genetic attack on neural cryptography, Genetic Attack on Neural Cryptography, pp.36121-036129, 2006.
DOI : 10.1103/PhysRevE.73.036121

I. Kanter, W. Kinzel, and E. Kanter, Secure exchange of information by synchronization of neural networks, Europhysics Letters (EPL), vol.57, issue.1, pp.141-147, 2002.
DOI : 10.1209/epl/i2002-00552-9

I. Kanter and W. Kinzel, The Theory of Neural Networks and Cryptography, Proceeding of the XXII Solvay Conference on Physics, The Physics of Communication, pp.631-644, 2003.

M. Rosen-zvi, E. Klein, I. Kanter, and W. Kinzel, Mutual learning in a tree parity machine and its application to cryptography, Physical Review E, vol.66, issue.6, p.66135, 2002.
DOI : 10.1103/PhysRevE.66.066135

E. Klein, R. Mislovaty, I. Kanter, A. Ruttor, and W. Kinzel, Synchronization of Neural Networks by Mutual Learning and its Application to Cryptography, Advances in Neural Information Processing Systems, pp.689-696, 2005.

A. Ruttor, Neural Synchronization and Cryptography, 2006.

S. Ibrachim and M. Maarof, A review on biological inspired computation in cryptology, Jurnal Teknologi Maklumat, vol.17, pp.90-98, 2005.

S. Dourlens, Neuro-Cryptography. MSc Thesis, Dept. of Microcomputers and Microelectronics, 1995.

P. Kotlarz and Z. Kotulski, On Application of Neural Networks for S-Boxes Design, LNCS, vol.3528, pp.243-248, 2005.
DOI : 10.1007/11495772_38

S. Bisalapur, Design of an efficient neural key distribution center, International Journal of Artificial Intelligence & Applications, vol.2, pp.60-69, 2011.

M. Volkmer and S. Wallner, Tree Parity Machine Rekeying Architectures, IEEE Transactions on Computers, vol.54, issue.4, pp.421-427, 2005.
DOI : 10.1109/TC.2005.70

URL : http://arxiv.org/abs/cs/0502062

M. Hassoun, Fundamentals of Artificial Neural Networks, 1995.

W. Mcculloch, A logical calculus of the ideas immanent in nervous activity, The Bulletin of Mathematical Biophysics, vol.5, issue.4, pp.115-133, 1943.
DOI : 10.1007/BF02478259

M. Dolecki, Klasyfikacja czasu synchronizacji sieci Tree Parity Machine u?ywanych do uzgadniania kluczy kryptograficznych (in Polish, 2014.

M. Dolecki and R. Kozera, Threshold Method of Detecting Long-Time TPM Synchronization, Proceedings of the 12 th International Conference on Computer Information Systems and Industrial Management Applications, pp.241-252, 2013.
DOI : 10.1007/978-3-642-40925-7_23

URL : https://hal.archives-ouvertes.fr/hal-01496071

M. Dolecki and R. Kozera, Distribution of the Tree Parity Machine synchronization time, Advances in Science and Technology Research Journal, pp.20-27, 2013.

M. Dolecki, R. Kozera, and K. Lenik, The evaluation of the TPM synchronization on the basis of their outputs, Journal of Achievements in Materials and Manufacturing Engineering, vol.57, pp.91-98, 2013.

M. Dolecki and R. Kozera, Distance of tree parity machine initial weights drawn from different distributions, Advances in Science and Technology Research Journal, pp.137-142, 2015.

R. Kozera and L. Noakes, More-or-less-uniform sampling and lengths of curves, Quarterly Of Applied Mathematics, vol.61, pp.475-484, 2003.

R. Kozera and L. Noakes, C-1 interpolation with cumulative chord cubics, Fundamenta Informaticae, pp.285-301, 2004.
DOI : 10.1007/1-4020-4179-9_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.9199

V. P. Gerdt and A. N. Prokopenya, Some algorithms for calculating unitary matrices for quantum circuits, Programming and Computer Software, pp.111-116, 2010.
DOI : 10.1134/s036176881002009x

V. P. Gerdt and A. N. Prokopenya, Simulation of quantum error correction by means of QuantumCircuit package, Programming and Computer Software, pp.143-149, 2013.

M. J. Brooks, W. Chojnacki, and R. Kozera, Shading without shape, Quarterly of Applied Mathematics, vol.50, issue.1, pp.27-38, 1992.
DOI : 10.1090/qam/1146621

R. Kozera, Uniqueness in shape from shading revisited, Journal of Mathematical Imaging and Vision, vol.7, issue.2, pp.123-138, 1997.
DOI : 10.1023/A:1008249420974

W. Homenda, Optical music recognition: the case study of pattern recognition, Computer Recognition Systems, et al. Book Series Advances in Soft Computing, pp.835-842, 2005.