Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)
MathSciNet
MATH
CrossRef
Google Scholar
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. In: Applied Cryptography, CRC Press, Boca Raton (1996)
CrossRef
Google Scholar
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)
Google Scholar
Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Upper Saddle River (2002)
Google Scholar
Kanter, I., Kanter, W., Kanter, E.: Secure exchange of information by synchronization of neural networks. Europhys. Lett. 57(1), 141–147 (2002)
CrossRef
Google Scholar
Maurer, U.: Secert key agreement by public discussion from common information. IEEE Trans. Inform. Theory 39(3), 733–742 (1993)
MathSciNet
MATH
CrossRef
Google Scholar
Volkmer, M., Wallner, S.: Tree parity machine rekeying architectures. IEEE Trans. Comput. 54(4), 421–427 (2005)
CrossRef
Google Scholar
Volkmer, M., Wallner, S.: Tree parity machine rekeying architectures for embedded security. “Cryptology ePrint Archive,” Inst. Comput. Technol., Hamburg Univ. Technol., Hamburg, Germany, Rep. 2005/235 (2005)
Google Scholar
Gross, N., Klein, E., Rosenbluh, M., Kinzel, W., Khaykovich, L., Kanter, I.: A framework for public-channel cryptography using chaotic lasers. Phys. Rev. E 73(6), 066 214-1–066 214-4 (2005)
Google Scholar
Klein, E., Kanter, R.M.I., Kinzel, W.: Public-channel cryptography using chaos synchronization. Phys. Rev. E 72(1), 016 214-1–016 214-4 (2005)
Google Scholar
Klein, E., Gross, N., Rosenbluh, M., Kinzel, W., Khaykovich, L., Kanter, I.: Stable isochronal synchronization of mutually coupled chaotic lasers. Phys. Rev. E 73(6), 066 214-1–066 214-4 (2006)
Google Scholar
Shacham, L.N., Klein, E., Mislovaty, R., Kanter, I., Kinzel, W.: Cooperating attackers in neural cryptography. Phys. Rev. E 69(6), 066 137-1–066 137-4 (2004)
Google Scholar
Saad, D.: On-line learning in neural networks. Cambridge University Press, Cambridge (1998)
MATH
Google Scholar
Reyes, O.M., Kopitzke, I., Zimmermann, K.-H.: Permutation parity machines for neural synchronization. Phys. A: Math. Gen. 42, 195002 (2009)
MathSciNet
CrossRef
Google Scholar
Reyes, O.M., Zimmermann, K.-H.: Permutation parity machines for neural cryptography. J. Phys. A: Math. Theor. 42, 195 002-1–195 002-20 (2009)
Google Scholar
Rosen-Zvi, M., Klein, E., Kanter, I., Kinzel, W.: Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. E 66(6), 066 135-1–066 135-13 (2002)
Google Scholar
Seoane, L.F., Ruttor, A.: Successful attack on permutation-parity-machine-based neural cryptography. Phys. Rev. E 85(2), 025 101-1–025 101-4 (2012)
Google Scholar
Metzler, R., Kinzel, W., Kanter, I.: Interacting neural networks. Phys. Rev. E 62(3), 2555–2565 (2000)
CrossRef
Google Scholar
Kinzel, W., Metzler, R., Kanter, I.: Dynamics of interacting neural networks. J. Phys. A: Math. Gen. 33(14), L141–L147 (2000)
Google Scholar
Kinzel, W., Kanter, I.: Disorder generated by interacting neural networks: application to econophysics and cryptography. J. Phys. A: Math. Gen. 36(43), 11 173–11 186 (2003)
Google Scholar
Kinzel, W., Kanter, I.: Interacting neural networks and cryptography. Advances in Solid State Physics (2002)
Google Scholar
Bornholdt, S., Schuster, H.: Theory of Interacting Neural Networks. Wiley VCH (2003)
Google Scholar
Ruttor, A., Kinzel, W., Naeh, R., Kanter, I.: Genetic attack on neural cryptography. Phys. Rev. E 73(3), 036 121-1–036 121-8 (2006)
Google Scholar
Ruttor, A., Kinzel, W., Kanter, I.: Dynamics of neural cryptographys. Phys. Rev. E 75(5), 056 104-1–056 104-4 (2007)
Google Scholar
Ruttor, A., Reents, G., Kinzel, W.: Sychronizition of random walks with reflecting boundaries. J. Phys. A: Math. Gen. 37, 8609–8618 (2004)
MathSciNet
MATH
CrossRef
Google Scholar
Ruttor, A., Kinzel, W., Shacham, L., Kanter, I.: Neural cryptography with feedback. Phys. Rev. E 69(4), 046 110-1–046 110-7 (2004)
Google Scholar
Ruttor, A., Kinzel, W., Kanter, I.: Neural cryptography with queries. J. Stat. Mech. 2005(1), 1–14 (2005)
CrossRef
Google Scholar
Allam, A.M., Abbas, H.M.: On the improvement of neural cryptography using erroneous transmitted information with error prediction. IEEE Trans. Neural Networks 21(12), 1915–1924
Google Scholar
Klimov, A., Mityaguine, A., Shamir, A.: Analysis of neural cryptography. In: Proc. 8th Int. Conf. Theory Appl. Cryptology Inform. Secur., pp. 288–298 (2002)
Google Scholar