Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
Cryptography, Theory and Practice, 1995. ,
Secure exchange of information by synchronization of neural networks, Europhysics Letters (EPL), vol.57, issue.1, pp.141-147, 2002. ,
DOI : 10.1209/epl/i2002-00552-9
Synchronization of Neural Networks by Mutual Learning and its Application to Cryptography, Advances in Neural Information Processing Systems, pp.689-696, 2005. ,
Analysis of Neural Cryptography, Advances in Cryptology -ASIACRYPT 2002, pp.287-298, 2003. ,
DOI : 10.1007/3-540-36178-2_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.363.1069
Neural Synchronization and Cryptography, 2006. ,
Genetic attack on neural cryptography, Genetic Attack on Neural Cryptography, pp.36121-036129, 2006. ,
DOI : 10.1103/PhysRevE.73.036121
URL : http://arxiv.org/abs/cond-mat/0512022
Neuro-Cryptography. MSc Thesis, Dept. of Microcomputers and Microelectronics, 1995. ,
On Application of Neural Networks for S-Boxes Design, LNCS, vol.3528, pp.243-248, 2005. ,
DOI : 10.1007/11495772_38
Neural Cryptography, p.208453, 2002. ,
Fundamentals of Artificial Neural Networks, 1995. ,
The Theory of Neural Networks and Cryptography, Proceeding of the XXII Solvay Conference on Physics, The Physics of Communication, pp.631-644, 2003. ,
Mutual learning in a tree parity machine and its application to cryptography, Physical Review E, vol.66, issue.6, p.66135, 2002. ,
DOI : 10.1103/PhysRevE.66.066135
Tree Parity Machine Synchronization Time ? Statistical Analysis, Mathematics , Physics and Informatics Series, issue.6153, pp.149-151, 2012. ,
DOI : 10.5604/20804075.1049490
URL : http://doi.org/10.5604/20804075.1049490
The Evaluation of the TPM Synchronization on the Basis of their Outputs ,