1 X. Lei, "Twolayer tree-connected feed-forward neural network model for neural cryptography" 87 (87): 2013
2 A. Ruttor, "Synchronization of random walks with reflecting boundaries" 37 (37): 2004
3 L. F. Seoane, "Successful attack on permutation-parity-machine-based neural cryptography" 85 (85): 2012
4 A. Engel, "Statistical Mechanics of Learning" Cambridge Univ. press 2001
5 I. Kanter, "Secure exchange of information by synchronization of neural networks" 57 (57): 2002
6 O. M. Reyes, "Permutation parity machines for neural synchronization" 42 (42): 195002-, 2009
7 A. Allam, "On the improvement of the neural cryptography using erroneous transmitted information with error prediction" 21 : 1915-1924, 2010
8 A. Ruttor, "Neural synchronization and cryptography" 2006
9 A. Ruttor, "Neural cryptography with queries" 2005 : P01009-, 2005
10 A. Ruttor, "Neural cryptography with feedback" 69 (69): 2004
1 X. Lei, "Twolayer tree-connected feed-forward neural network model for neural cryptography" 87 (87): 2013
2 A. Ruttor, "Synchronization of random walks with reflecting boundaries" 37 (37): 2004
3 L. F. Seoane, "Successful attack on permutation-parity-machine-based neural cryptography" 85 (85): 2012
4 A. Engel, "Statistical Mechanics of Learning" Cambridge Univ. press 2001
5 I. Kanter, "Secure exchange of information by synchronization of neural networks" 57 (57): 2002
6 O. M. Reyes, "Permutation parity machines for neural synchronization" 42 (42): 195002-, 2009
7 A. Allam, "On the improvement of the neural cryptography using erroneous transmitted information with error prediction" 21 : 1915-1924, 2010
8 A. Ruttor, "Neural synchronization and cryptography" 2006
9 A. Ruttor, "Neural cryptography with queries" 2005 : P01009-, 2005
10 A. Ruttor, "Neural cryptography with feedback" 69 (69): 2004
11 A. Jensen, "Lecture Notes on Difference Equations" Aalborg University 2011
12 M. Abadi, "Learning to protect communications with adversarial neural cryptography"
13 A. Ruttor, "Genetic attack on neural cryptography" 73 (73): 2006
14 S. Pattanayad, "Encryption based on neural cryptography" 321-330, 2017
15 P. Xie, "Crypto-nets: Neural networks over encrypted data"
16 L. N. Shacham, "Cooperating attackers in neural cryptography" 69 (69): 2004
17 A. Klimov, "Analysis of neural cryptography" Springer Verlag 288-298, 2002
18 W. Feller, "An Introduction to Probability Theory and Its Applications" Wiley 1968
19 R. Mislovaty, "A Secure key-exchange protocol with an absence of injective functions" 66 (66): 2002