• Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network...
    15 KB (2,224 words) - 13:07, 12 May 2025
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    63 KB (6,408 words) - 18:40, 5 June 2025
  • Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    82 KB (9,126 words) - 16:08, 3 June 2025
  • Vargas, D. V.; Sakurai, K. (November 2018). "Neural Cryptography Based on the Topology Evolving Neural Networks". 2018 Sixth International Symposium...
    44 KB (4,223 words) - 09:28, 25 May 2025
  • Key-agreement protocol (category Cryptography)
    In cryptography, a key-agreement protocol is a protocol whereby two (or more) parties generate a cryptographic key as a function of information provided...
    12 KB (1,470 words) - 17:20, 14 January 2025
  • Thumbnail for Ido Kanter
    ultrafast physical random number generators, theory of neural networks, neural cryptography, deep learning and synchronization among neurons and lasers...
    10 KB (765 words) - 22:20, 7 May 2025
  • Thumbnail for Quantum neural network
    Quantum neural networks are computational neural network models which are based on the principles of quantum mechanics. The first ideas on quantum neural computation...
    21 KB (2,552 words) - 08:32, 9 May 2025
  • Thumbnail for Coding theory
    fitness for specific applications. Codes are used for data compression, cryptography, error detection and correction, data transmission and data storage....
    27 KB (3,712 words) - 13:40, 27 April 2025
  • Thumbnail for Ria Cheruvu
    excellence (cum laude) in 2016 and 2017. She plans to pursue a career in neural cryptography.[citation needed] Cheruvu graduated from the Harvard University Extension...
    4 KB (448 words) - 23:58, 29 December 2024
  • Enables Efficient Homomorphic Inference of Deep Neural Networks" (PDF). Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science...
    42 KB (4,692 words) - 23:00, 1 April 2025
  • Thumbnail for Ron Rivest
    scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an Institute Professor...
    27 KB (1,543 words) - 18:26, 27 April 2025
  • Chaos communications (category Theory of cryptography)
    Synchronizing these oscillators is similar to synchronizing random neural nets in neural cryptography. When chaos synchronization is used, a basic scheme of a communications...
    3 KB (412 words) - 18:59, 5 September 2024
  • authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for secure...
    5 KB (720 words) - 06:35, 18 August 2024
  • examples of AVX-512 applications, including media processing, cryptography, video games, neural networks, and even OpenJDK, which employs AVX-512 for sorting...
    87 KB (4,830 words) - 07:39, 12 June 2025
  • Thumbnail for Manuel Blum
    foundations of computational complexity theory and its application to cryptography and program checking". Blum was born to a Jewish family in Venezuela...
    10 KB (722 words) - 13:43, 5 June 2025
  • ensemble (cryptography) Ensemble Kalman filter Ensemble learning (statistics and machine learning) Ensembl genome database project Neural ensemble, a...
    2 KB (250 words) - 16:33, 6 January 2025
  • recent definitions of a backdoor. However, since the advent of public key cryptography the term trapdoor has acquired a different meaning (see trapdoor function)...
    40 KB (4,448 words) - 19:13, 10 March 2025
  • reverse-engineering the code is cryptographically hard. This is formalized in the many proposals for indistinguishability obfuscation, a cryptographic primitive that,...
    18 KB (1,668 words) - 18:48, 29 May 2025
  • Thumbnail for Echo state network
    Echo state network (category Neural network architectures)
    state network (ESN) is a type of reservoir computer that uses a recurrent neural network with a sparsely connected hidden layer (with typically 1% connectivity)...
    13 KB (1,745 words) - 00:14, 4 June 2025
  • Thumbnail for Quantum computing
    Quantum computing (category Quantum cryptography)
    applications during World War II; computers played a major role in wartime cryptography, and quantum physics was essential for nuclear physics used in the Manhattan...
    113 KB (12,430 words) - 14:39, 13 June 2025
  • Thumbnail for Branch predictor
    Branch predication Branch prediction analysis attacks – on RSA public-key cryptography Instruction unit Cache prefetching Indirect branch control (IBC) Indirect...
    40 KB (4,762 words) - 06:50, 30 May 2025
  • Thumbnail for Theoretical computer science
    computation, quantum computation, automata theory, information theory, cryptography, program semantics and verification, algorithmic game theory, machine...
    42 KB (4,803 words) - 23:57, 1 June 2025
  • Grover's algorithm (category Post-quantum cryptography)
    asymptotic speed-ups to many kinds of brute-force attacks on symmetric-key cryptography, including collision attacks and pre-image attacks. However, this may...
    32 KB (4,691 words) - 00:04, 16 May 2025
  • Thumbnail for Nir Shavit
    2025-02-24. Goldreich, Oded, ed. (2019). Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. Association for Computing...
    5 KB (390 words) - 18:44, 26 May 2025
  • Thumbnail for Seq2seq
    Seq2seq (category Artificial neural networks)
    problem of translation could conceivably be treated as a problem in cryptography. When I look at an article in Russian, I say: 'This is really written...
    23 KB (2,946 words) - 06:00, 19 May 2025
  • particular purpose. In cryptography to capture the notion of knowledge obtained by an algorithm through the execution of a cryptographic protocol such as a...
    16 KB (1,900 words) - 16:39, 1 June 2025
  • Diversity in Classification Ensemble (Brief Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527....
    53 KB (6,685 words) - 14:14, 8 June 2025
  • BB84 (category Quantum cryptography)
    Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure assuming a perfect implementation...
    8 KB (1,098 words) - 16:07, 21 May 2025
  • Johnny Mnemonic is a 1995 cyberpunk action film directed by Robert Longo in his feature directorial debut. William Gibson, who wrote the 1981 short story...
    48 KB (5,010 words) - 23:55, 29 May 2025