Neural networks-based cryptography: A survey

I Meraouche, S Dutta, H Tan, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …

Learning the enigma with recurrent neural networks

S Greydanus - arxiv preprint arxiv:1708.07576, 2017 - arxiv.org
Recurrent neural networks (RNNs) represent the state of the art in translation, image
captioning, and speech recognition. They are also capable of learning algorithmic tasks …

[PDF][PDF] Classification of efficient symmetric key cryptography algorithms

S Mewada, P Sharma, SS Gautam - International Journal of …, 2016 - academia.edu
Security threats have been a major concern as a result of emergence of technology in every
aspect including internet market, computational and communication technologies. To solve …

Exploration of efficient symmetric AES algorithm

S Mewada, P Sharma… - 2016 Symposium on …, 2016 - ieeexplore.ieee.org
Security threats have been a major concern as a result of emergence of technology in every
aspect including internet market, computational and communication technologies. To solve …

Classification and identification of classical cipher type using artificial neural networks

AJ Abd, S Al-Janabi - Journal of Engineering and Applied …, 2019 - papers.ssrn.com
In this paper, the capability of classifying the main types of classical ciphers systems is
presented using Artificial Neural Networks (ANNs) starting from simplest form of information …

Exploration of efficient symmetric algorithms

S Mewada, P Sharma… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
Security threats have been a major concern as a result of emergence of technology in every
aspect including internet market, computational and communication technologies. To solve …

Cryptanalyzing Merkle-Hellman public key cryptosystem with artificial neural networks

AN Khan, MY Fan, A Malik… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Analyzing any cryptographic algorithm is in general a herculean task but smart use of
Artificial Intelligence (AI) can deliver some positive results. Various attempts regarding …

Secure multi-party multi-key adversarial cryptography using gan

JJ Justus - 2024 3rd International Conference on Artificial …, 2024 - ieeexplore.ieee.org
The realm of cryptography, rooted in neural networks, has experienced advancements
following the inception of adversarial cryptography. This approach employs Generative …

[PDF][PDF] Cryptic mining: apriori analysis of parameterized automatic variable key based symmetric cryptosystem

S Prajapat, RS Thakur - International Journal of Computer Science …, 2016 - academia.edu
This paper presents enhanced model of security of symmetric key based cryptosystem [1].
The enhancement of model by variable keys and key exchange using parameters only …

[PDF][PDF] Investigation of Efficient Cryptic Algorithm for Storing Video Files in Cloud

A Sharma, RS Thakur, S Jaloree - ISROSET-International Journal of …, 2016 - academia.edu
The Cloud computing has very good impact on the way we use ICT resources. We are using
various offerings of cloud computing which includes Flexible processing and Storage …