Spying on chaos-based cryptosystems with reservoir computing.
Piotr AntonikMarvyn GulinaJaël PauwelsDamien RontaniMarc HaeltermanSerge MassarPublished in: IJCNN (2018)
Keyphrases
- reservoir computing
- recurrent neural networks
- elliptic curve
- secret key
- cryptographic protocols
- signature scheme
- image encryption
- private key
- image encryption algorithm
- fuzzy vault
- encryption algorithm
- feed forward
- pseudorandom number
- public key cryptosystems
- chaotic sequence
- public key
- secret information
- smart card
- artificial intelligence
- machine learning
- chaotic maps
- standard model
- artificial neural networks
- similarity measure
- database