Use of Neural Networks in Cryptography: A Review

被引:0
作者
Hadke, Pranita P. [1 ]
Kale, Swati G. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Dept Informat Technol, Nagpur, Maharashtra, India
[2] Yeshwantrao Chavan Coll Engn, Dept IT, Nagpur, Maharashtra, India
来源
2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE) | 2016年
关键词
cryptography; cryptosystem; Neural Network; key generation and management;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.
引用
收藏
页数:4
相关论文
共 50 条
[31]   The use of neural networks on VLE data prediction [J].
Bilgin, M ;
Hasdemir, IM ;
Oztas, O .
JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2004, 63 (04) :336-343
[32]   Use of cryptography in malware obfuscation [J].
Hassan Jameel Asghar ;
Benjamin Zi Hao Zhao ;
Muhammad Ikram ;
Giang Nguyen ;
Dali Kaafar ;
Sean Lamont ;
Daniel Coscia .
Journal of Computer Virology and Hacking Techniques, 2024, 20 :135-152
[33]   On the use of dynamical systems in cryptography [J].
Everett, Samuel .
CHAOS SOLITONS & FRACTALS, 2024, 183
[34]   Application of Neural Networks in Software Engineering: A Review [J].
Singh, Yogesh ;
Bhatia, Pradeep Kumar ;
Kaur, Arvinder ;
Sangwan, Omprakash .
INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 :128-+
[35]   Application of Neural Networks in Power Systems; A Review [J].
Haque, M. Tarafdar ;
Kashtiban, A. M. .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, :53-57
[36]   Spiking neural networks for autonomous driving: A review [J].
Martinez, Fernando S. ;
Casas-Roma, Jordi ;
Subirats, Laia ;
Parada, Raul .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 138
[37]   A REVIEW OF APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN CRYPTOSYSTEMS [J].
Schmidt, T. ;
Rahnama, H. ;
Sadeghian, A. .
2008 WORLD AUTOMATION CONGRESS PROCEEDINGS, VOLS 1-3, 2008, :748-753
[38]   Neural networks and statistical techniques: A review of applications [J].
Paliwal, Mukta ;
Kumar, Usha A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (01) :2-17
[39]   Image and Video Compression With Neural Networks: A Review [J].
Ma, Siwei ;
Zhang, Xinfeng ;
Jia, Chuanmin ;
Zhao, Zhenghui ;
Wang, Shiqi ;
Wang, Shanshe .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (06) :1683-1698
[40]   Use of cryptography in malware obfuscation [J].
Asghar, Hassan Jameel ;
Zhao, Benjamin Zi Hao ;
Ikram, Muhammad ;
Nguyen, Giang ;
Kaafar, Dali ;
Lamont, Sean ;
Coscia, Daniel .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) :135-152