A REVIEW OF APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN CRYPTOSYSTEMS

被引:0
作者
Schmidt, T. [1 ]
Rahnama, H. [1 ]
Sadeghian, A. [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
来源
2008 WORLD AUTOMATION CONGRESS PROCEEDINGS, VOLS 1-3 | 2008年
关键词
Cryptography; Machine learning; Artificial neural networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a review of the literature on the use of artificial neutral networks in cryptography. Different neural network based approaches have been categorized based on their applications to different components of cryptosystems such as secret key protocols, visual cryptography, design of random generators, digital watermarking, and steganalysis.
引用
收藏
页码:748 / 753
页数:6
相关论文
共 34 条
  • [1] Chosen plaintext attack against neural network-based symmetric cipher
    Arvandi, M.
    Sadeghian, A.
    [J]. 2007 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-6, 2007, : 847 - +
  • [2] Arvandi M, 2006, IEEE IJCNN, P2039
  • [3] Are artificial neural networks black boxes?
    Benitez, JM
    Castro, JL
    Requena, I
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 1997, 8 (05): : 1156 - 1164
  • [4] Chi-Kwong Chan, 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187), P183, DOI 10.1109/ISCAS.1998.703946
  • [5] Courtois NT, 2002, LECT NOTES COMPUT SC, V2501, P267
  • [6] Daemen Joan, 2002, The design of rijndael, V2
  • [7] HONGXUN Y, 2004, P C INT CONTR AUT, V5, P4066
  • [8] Hongxun Y., 2003, P INT C MULT EXP, V2, P509
  • [9] MULTILAYER FEEDFORWARD NETWORKS ARE UNIVERSAL APPROXIMATORS
    HORNIK, K
    STINCHCOMBE, M
    WHITE, H
    [J]. NEURAL NETWORKS, 1989, 2 (05) : 359 - 366
  • [10] HU M, 2003, P 37 ANN CARN C SEC, P325