Security of neural cryptography.
Rachel MislovatyEinat KleinIdo KanterWolfgang KinzelPublished in: ICECS (2004)
Keyphrases
- information security
- encryption algorithms
- network architecture
- intrusion detection
- security issues
- information assurance
- statistical databases
- cryptographic algorithms
- security requirements
- access control
- neural network
- cellular automata
- cryptographic protocols
- computer security
- functional requirements
- security protocols
- data security
- network security
- security problems
- security vulnerabilities
- public key cryptography
- network management
- sensitive data
- privacy preserving
- elliptic curve cryptography
- data encryption
- security measures
- security threats
- security policies
- security level
- smart card
- security mechanisms