Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network...
15 KB (2,224 words) - 13:07, 12 May 2025
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
63 KB (6,408 words) - 18:40, 5 June 2025
Articles related to cryptography include: A5/1 • A5/2 • ABA digital signature guidelines • ABC (stream cipher) • Abraham Sinkov • Acoustic cryptanalysis...
67 KB (2,932 words) - 23:20, 16 May 2025
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
82 KB (9,126 words) - 16:08, 3 June 2025
Vargas, D. V.; Sakurai, K. (November 2018). "Neural Cryptography Based on the Topology Evolving Neural Networks". 2018 Sixth International Symposium...
44 KB (4,223 words) - 09:28, 25 May 2025
Key-agreement protocol (category Cryptography)
In cryptography, a key-agreement protocol is a protocol whereby two (or more) parties generate a cryptographic key as a function of information provided...
12 KB (1,470 words) - 17:20, 14 January 2025
ultrafast physical random number generators, theory of neural networks, neural cryptography, deep learning and synchronization among neurons and lasers...
10 KB (765 words) - 22:20, 7 May 2025
Quantum neural networks are computational neural network models which are based on the principles of quantum mechanics. The first ideas on quantum neural computation...
21 KB (2,552 words) - 08:32, 9 May 2025
Coding theory (section Cryptographic coding)
fitness for specific applications. Codes are used for data compression, cryptography, error detection and correction, data transmission and data storage....
27 KB (3,712 words) - 13:40, 27 April 2025
excellence (cum laude) in 2016 and 2017. She plans to pursue a career in neural cryptography.[citation needed] Cheruvu graduated from the Harvard University Extension...
4 KB (448 words) - 23:58, 29 December 2024
Homomorphic encryption (redirect from Homomorphic cryptography)
Enables Efficient Homomorphic Inference of Deep Neural Networks" (PDF). Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science...
42 KB (4,692 words) - 23:00, 1 April 2025
Ron Rivest (section Cryptography)
scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an Institute Professor...
27 KB (1,543 words) - 18:26, 27 April 2025
Chaos communications (category Theory of cryptography)
Synchronizing these oscillators is similar to synchronizing random neural nets in neural cryptography. When chaos synchronization is used, a basic scheme of a communications...
3 KB (412 words) - 18:59, 5 September 2024
authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for secure...
5 KB (720 words) - 06:35, 18 August 2024
AVX-512 (redirect from Vector Neural Network Instructions)
examples of AVX-512 applications, including media processing, cryptography, video games, neural networks, and even OpenJDK, which employs AVX-512 for sorting...
87 KB (4,830 words) - 07:39, 12 June 2025
foundations of computational complexity theory and its application to cryptography and program checking". Blum was born to a Jewish family in Venezuela...
10 KB (722 words) - 13:43, 5 June 2025
ensemble (cryptography) Ensemble Kalman filter Ensemble learning (statistics and machine learning) Ensembl genome database project Neural ensemble, a...
2 KB (250 words) - 16:33, 6 January 2025
Backdoor (computing) (redirect from Backdoor (cryptography))
recent definitions of a backdoor. However, since the advent of public key cryptography the term trapdoor has acquired a different meaning (see trapdoor function)...
40 KB (4,448 words) - 19:13, 10 March 2025
Obfuscation (software) (redirect from Cryptographic obfuscation)
reverse-engineering the code is cryptographically hard. This is formalized in the many proposals for indistinguishability obfuscation, a cryptographic primitive that,...
18 KB (1,668 words) - 18:48, 29 May 2025
Echo state network (category Neural network architectures)
state network (ESN) is a type of reservoir computer that uses a recurrent neural network with a sparsely connected hidden layer (with typically 1% connectivity)...
13 KB (1,745 words) - 00:14, 4 June 2025
Quantum computing (category Quantum cryptography)
applications during World War II; computers played a major role in wartime cryptography, and quantum physics was essential for nuclear physics used in the Manhattan...
113 KB (12,430 words) - 14:39, 13 June 2025
Branch predictor (redirect from Neural branch prediction)
Branch predication Branch prediction analysis attacks – on RSA public-key cryptography Instruction unit Cache prefetching Indirect branch control (IBC) Indirect...
40 KB (4,762 words) - 06:50, 30 May 2025
Theoretical computer science (section Cryptography)
computation, quantum computation, automata theory, information theory, cryptography, program semantics and verification, algorithmic game theory, machine...
42 KB (4,803 words) - 23:57, 1 June 2025
Grover's algorithm (category Post-quantum cryptography)
asymptotic speed-ups to many kinds of brute-force attacks on symmetric-key cryptography, including collision attacks and pre-image attacks. However, this may...
32 KB (4,691 words) - 00:04, 16 May 2025
2025-02-24. Goldreich, Oded, ed. (2019). Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. Association for Computing...
5 KB (390 words) - 18:44, 26 May 2025
Seq2seq (category Artificial neural networks)
problem of translation could conceivably be treated as a problem in cryptography. When I look at an article in Russian, I say: 'This is really written...
23 KB (2,946 words) - 06:00, 19 May 2025
particular purpose. In cryptography to capture the notion of knowledge obtained by an algorithm through the execution of a cryptographic protocol such as a...
16 KB (1,900 words) - 16:39, 1 June 2025
Diversity in Classification Ensemble (Brief Announcement)". Cyber Security Cryptography and Machine Learning. Lecture Notes in Computer Science. Vol. 11527....
53 KB (6,685 words) - 14:14, 8 June 2025
BB84 (category Quantum cryptography)
Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure assuming a perfect implementation...
8 KB (1,098 words) - 16:07, 21 May 2025
Johnny Mnemonic (film) (redirect from Neural Attenuation Syndrome)
Johnny Mnemonic is a 1995 cyberpunk action film directed by Robert Longo in his feature directorial debut. William Gibson, who wrote the 1981 short story...
48 KB (5,010 words) - 23:55, 29 May 2025