TY - JOUR
T1 - Security of neural cryptography
AU - Mislovaty, R.
AU - Klein, E.
AU - Kanter, I.
AU - Kinzel, W.
PY - 2004/12/1
Y1 - 2004/12/1
N2 - In this paper we analyze the security of Neural Cryptography, a novel key-exchange protocol based on synchronization of Neural Networks[1]. Various attacks on this protocol were suggested by Shamir et al., and the protocol was shown to be secure against them[2]. A new attack strategy involving a large number of cooperating attackers, that succeeds to reveal the encryption key was recently found[3]. ©2004 IEEE.
AB - In this paper we analyze the security of Neural Cryptography, a novel key-exchange protocol based on synchronization of Neural Networks[1]. Various attacks on this protocol were suggested by Shamir et al., and the protocol was shown to be secure against them[2]. A new attack strategy involving a large number of cooperating attackers, that succeeds to reveal the encryption key was recently found[3]. ©2004 IEEE.
UR - http://www.scopus.com/inward/record.url?scp=27644590063&partnerID=8YFLogxK
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
JO - 11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004
JF - 11th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2004
ER -