A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Impact of the TPM Weights Distribution on Network Synchronization Time
[chapter]
2015
Lecture Notes in Computer Science
Significant impact of this parameter's value on the distribution of the TPM synchronization time is studied in [21, 23] . ...
In this paper a new topic is analyzed, namely the impact on synchronization time of the distribution, from which initial network's weights are drawn. ...
doi:10.1007/978-3-319-24369-6_37
fatcat:nj4uus2kevcybioq7kpukbclga
Synchronization of Tree Parity Machines using non-binary input vectors
[article]
2021
arXiv
pre-print
As a result, the duration of the synchronization process is reduced. Therefore, tree parity machines achieve common weights in a shorter time due to the reduction of necessary bit exchanges. ...
Neural cryptography is the application of artificial neural networks in the subject of cryptography. The functionality of this solution is based on a tree parity machine. ...
ACKNOWLEDGEMENT This work was supported by the ECHO project which has received funding from the European Union's Horizon 2020 research and innovation programme under the grant agreement no. 830943. ...
arXiv:2104.11105v1
fatcat:pyovfgfosnaklovehkbq4ze3ru
DISTANCE OF THE INITIAL WEIGHTS OF TREE PARITY MACHINE DRAWN FROM DIFFERENT DISTRIBUTIONS
2015
Advances in Science and Technology Research Journal
The time needed to synchronize both networks depends on their initial weights values and the input vectors which are also randomly generated at each step of learning. ...
In this paper the relationship between the distribution, from which the initial weights of the network are drawn, and their compatibility is discussed. ...
This article discusses the impact of the distribution of the initial weights values drawn on their initial compatibility. ...
doi:10.12913/22998624/2380
fatcat:z3hfk7ywdzes7bk5tyg4ejt6ga
DISTRIBUTION OF THE TREE PARITY MACHINE SYNCHRONIZATION TIME
2013
Advances in Science and Technology Research Journal
Though the time needed to achieve compatible weights vectors in both partner networks depends on their topology, the histograms generated herein render similar distribution patterns. ...
Evidently the calculation of such parameters permits to assess the probability of achieving both networks' synchronization in a given time only upon resorting to the generated distribution tables. ...
The latter impacts on some variation in the number of intervals for the different networks. ...
doi:10.5604/20804075.1049490
fatcat:juqfqnm4qvd2hgbjx3eubvlqqm
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key
2019
Security and Communication Networks
In more than 15 million simulations that were executed, we measured synchronization times, the number of steps required, and the number of times in which an attacking TPM network manages to imitate the ...
The simulations resulted in the optimal combination, minimizing the synchronization time and prioritizing security against the attacking network. ...
Acknowledgments The funding of this scientific research is provided by the Ecuadorian Corporation for the Development of Research and the Academy (RED CEDIA) and also from the Mobility Regulation of the ...
doi:10.1155/2019/8214681
fatcat:olyvln4sqbce7ergeab6jv7ybe
Error Reconciliation in Quantum Key Distribution Protocols
[chapter]
2020
Lecture Notes in Computer Science
Quantum Key Distribution (QKD) protocols allow the establishment of symmetric cryptographic keys up to a limited distance at limited rates. ...
We also briefly describe a new approach to key reconciliation techniques based on artificial neural networks. ...
At the beginning of this process, each TPM generates random values of weights, however after the synchronization process both users have TPMs with the same values of weights. ...
doi:10.1007/978-3-030-47361-7_11
fatcat:ngnztdorkjfzbb5dbnxusydc6e
Artificial Neural Synchronization Using Nature Inspired Whale Optimization
2021
IEEE Access
In some steps, it results in complete synchronization, and the weights of the two DLTMs become identical. These identical weights serve as a secret key. ...
At the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information. ...
The timing distribution of the two TPM networks is adapted from the Poisson distribution by Dolecki and Kozera [27] . Pu et al. ...
doi:10.1109/access.2021.3052884
fatcat:4korm7smyrhjxbd7q2oic5nd3m
Load Balancing with Tree Parity Machine
2015
International Journal of Grid and Distributed Computing
As a result, consumption of energy can be significantly lowered. The conservative approach of over-provisioning is, thus, avoided. ...
Weighted active monitoring load balancing algorithm, dynamic load balancing algorithm, static algorithms, and ant colony algorithm are all used for load balancing in distributed computing systems. ...
Without her assistance and guidance, we would not have been able to make use of the university's infrastructure and laboratory facilities for conducting our research. ...
doi:10.14257/ijgdc.2015.8.3.17
fatcat:asuzofjlmjbihgcdq2ahjjvj6m
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme
2010
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks. ...
On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource-and power-efficient. ...
network on a set of common inputs. ...
doi:10.1109/euc.2010.97
dblp:conf/euc/StottingerHMK10
fatcat:r3tdeify25ephfwwgyzmdxzkpe
Analysis Methodology for Evaluation of Time-Delay Impact on Network-Based System for Droop-Controlled AC Microgrid
2019
Electronics
To investigate and handle the impacts of time-delay, a suit of analytical methodology is proposed, where both delay-insensitive and delay-sensitive control strategies of network-based system have their ...
Experimental results also show the effectiveness of the proposed methodology in droop-controlled AC microgrid system, which provides theoretical guidance on how to use network-based control for the other ...
The conclusion can be drawn that system is less influential on the time-delay impact in TPM. ...
doi:10.3390/electronics8040380
fatcat:ueawns2okvcipatw5wvp643qoq
Mutual learning-based efficient synchronization of neural networks to exchange the neural key
2021
Complex & Intelligent Systems
There is an issue of delay in the current techniques in the synchronization assessment that has an impact on the security and privacy of the neural synchronization. ...
In the absence of a weight vector from another party, the key challenge with neural synchronization is how to assess the coordination of two communication parties. ...
Acknowledgements The author expressed deep gratitude for the moral and congenial atmosphere support provided by Ramakrishna Mission Vidyamandira, Belur Math, India. ...
doi:10.1007/s40747-021-00344-7
fatcat:2fucw5wmyrft3ohiqijbh3f3ni
Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization
2022
Sensors
The efficiency of the suggested method is tested, and the results show that it surpasses similar strategies already in use. ...
Furthermore, in the V2X heterogeneous networks, this paper offers an efficient and effective information fusion security mechanism for multiple sources and multiple type data sharing. ...
Time Netork delay on a heterogeneous network comprises delay on the DSRC network between cars and RSUs, delay on the Internet between RSUs and key distribution servers, and random delay congestion on the ...
doi:10.3390/s22041652
pmid:35214554
pmcid:PMC8875360
fatcat:bcxbhnbmune73lwppj6n5jk63m
A Multi-Agent Framework for Thermal Aware Task Migration in Many-Core Systems
2012
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
As the system complexity increases, it is more and more difficult to perform thermal management in a centralized manner because of state explosion and the overhead of monitoring the entire chip. ...
Experimental results show that, our distributed management policy achieves almost the same performance as a global management policy when the tasks are initially randomly distributed. ...
impact on the steady state temperature of all other PEs. ...
doi:10.1109/tvlsi.2011.2162348
fatcat:vxztslr67jfujkojv4smitsyeu
Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement
2021
IEEE Access
[19] evaluated the impact of the variation of parameters on protection and the success of the different quality learning laws. ...
The synchronization time is minimized by using the optimum parameters. 4) Designing an optimal neural network structure that enables faster synchronization of neural networks of two IoT devices. ...
doi:10.1109/access.2021.3082262
fatcat:4jwy37izkjgejb4kxxs2elu3xi
Distributed task migration for thermal management in many-core systems
2010
Proceedings of the 47th Design Automation Conference on - DAC '10
As the system complexity increases, it is more and more difficult to perform thermal management in a centralized manner because of state explosion and the overhead of monitoring the entire chip. ...
In the deep submicron era, thermal hot spots and large temperature gradients significantly impact system reliability, performance, cost and leakage power. ...
The OS switches from one task to another when the time slice expires. The scheduling intervals of different cores do not have to be synchronized. ...
doi:10.1145/1837274.1837417
dblp:conf/dac/GeMQ10
fatcat:chwwtjyl2zhzdldbq5kfmruq4m
« Previous
Showing results 1 — 15 out of 588 results