Filters








588 Hits in 2.7 sec

The Impact of the TPM Weights Distribution on Network Synchronization Time [chapter]

Michał Dolecki, Ryszard Kozera
2015 Lecture Notes in Computer Science  
Significant impact of this parameter's value on the distribution of the TPM synchronization time is studied in [21, 23] .  ...  In this paper a new topic is analyzed, namely the impact on synchronization time of the distribution, from which initial network's weights are drawn.  ... 
doi:10.1007/978-3-319-24369-6_37 fatcat:nj4uus2kevcybioq7kpukbclga

Synchronization of Tree Parity Machines using non-binary input vectors [article]

Miłosz Stypiński, Marcin Niemiec
2021 arXiv   pre-print
As a result, the duration of the synchronization process is reduced. Therefore, tree parity machines achieve common weights in a shorter time due to the reduction of necessary bit exchanges.  ...  Neural cryptography is the application of artificial neural networks in the subject of cryptography. The functionality of this solution is based on a tree parity machine.  ...  ACKNOWLEDGEMENT This work was supported by the ECHO project which has received funding from the European Union's Horizon 2020 research and innovation programme under the grant agreement no. 830943.  ... 
arXiv:2104.11105v1 fatcat:pyovfgfosnaklovehkbq4ze3ru

DISTANCE OF THE INITIAL WEIGHTS OF TREE PARITY MACHINE DRAWN FROM DIFFERENT DISTRIBUTIONS

Michał Dolecki, Ryszard Kozera
2015 Advances in Science and Technology Research Journal  
The time needed to synchronize both networks depends on their initial weights values and the input vectors which are also randomly generated at each step of learning.  ...  In this paper the relationship between the distribution, from which the initial weights of the network are drawn, and their compatibility is discussed.  ...  This article discusses the impact of the distribution of the initial weights values drawn on their initial compatibility.  ... 
doi:10.12913/22998624/2380 fatcat:z3hfk7ywdzes7bk5tyg4ejt6ga

DISTRIBUTION OF THE TREE PARITY MACHINE SYNCHRONIZATION TIME

Michał Dolecki, Ryszard Kozera
2013 Advances in Science and Technology Research Journal  
Though the time needed to achieve compatible weights vectors in both partner networks depends on their topology, the histograms generated herein render similar distribution patterns.  ...  Evidently the calculation of such parameters permits to assess the probability of achieving both networks' synchronization in a given time only upon resorting to the generated distribution tables.  ...  The latter impacts on some variation in the number of intervals for the different networks.  ... 
doi:10.5604/20804075.1049490 fatcat:juqfqnm4qvd2hgbjx3eubvlqqm

On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key

Édgar Salguero Dorokhin, Walter Fuertes, Edison Lascano
2019 Security and Communication Networks  
In more than 15 million simulations that were executed, we measured synchronization times, the number of steps required, and the number of times in which an attacking TPM network manages to imitate the  ...  The simulations resulted in the optimal combination, minimizing the synchronization time and prioritizing security against the attacking network.  ...  Acknowledgments The funding of this scientific research is provided by the Ecuadorian Corporation for the Development of Research and the Academy (RED CEDIA) and also from the Mobility Regulation of the  ... 
doi:10.1155/2019/8214681 fatcat:olyvln4sqbce7ergeab6jv7ybe

Error Reconciliation in Quantum Key Distribution Protocols [chapter]

Miralem Mehic, Marcin Niemiec, Harun Siljak, Miroslav Voznak
2020 Lecture Notes in Computer Science  
Quantum Key Distribution (QKD) protocols allow the establishment of symmetric cryptographic keys up to a limited distance at limited rates.  ...  We also briefly describe a new approach to key reconciliation techniques based on artificial neural networks.  ...  At the beginning of this process, each TPM generates random values of weights, however after the synchronization process both users have TPMs with the same values of weights.  ... 
doi:10.1007/978-3-030-47361-7_11 fatcat:ngnztdorkjfzbb5dbnxusydc6e

Artificial Neural Synchronization Using Nature Inspired Whale Optimization

Arindam Sarkar, Mohammad Zubair Khan, Moirangthem Marjit Singh, Abdulfattah Noorwali, Chinmay Chakraborty, Subhendu Kumar Pani
2021 IEEE Access  
In some steps, it results in complete synchronization, and the weights of the two DLTMs become identical. These identical weights serve as a secret key.  ...  At the time of exchange of sensitive information, intruders can effortlessly perform sniffing, spoofing, phishing, or Man-In-The-Middle (MITM) attack to tamper the vital information.  ...  The timing distribution of the two TPM networks is adapted from the Poisson distribution by Dolecki and Kozera [27] . Pu et al.  ... 
doi:10.1109/access.2021.3052884 fatcat:4korm7smyrhjxbd7q2oic5nd3m

Load Balancing with Tree Parity Machine

Ranjan Kumar Mondal, Rajesh Bose, Debabrata Sarddar
2015 International Journal of Grid and Distributed Computing  
As a result, consumption of energy can be significantly lowered. The conservative approach of over-provisioning is, thus, avoided.  ...  Weighted active monitoring load balancing algorithm, dynamic load balancing algorithm, static algorithms, and ant colony algorithm are all used for load balancing in distributed computing systems.  ...  Without her assistance and guidance, we would not have been able to make use of the university's infrastructure and laboratory facilities for conducting our research.  ... 
doi:10.14257/ijgdc.2015.8.3.17 fatcat:asuzofjlmjbihgcdq2ahjjvj6m

Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme

Marc Stottinger, Sorin A. Huss, Sascha Muhlbach, Andreas Koch
2010 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
One of the candidates for such a new algorithm is the Tree Parity Machine Public Key Exchange, an algorithm based on artificial neural networks.  ...  On the other hand, with the increasing use of cryptography in embedded systems a significant demand exists for cryptographic algorithms that are both resource-and power-efficient.  ...  network on a set of common inputs.  ... 
doi:10.1109/euc.2010.97 dblp:conf/euc/StottingerHMK10 fatcat:r3tdeify25ephfwwgyzmdxzkpe

Analysis Methodology for Evaluation of Time-Delay Impact on Network-Based System for Droop-Controlled AC Microgrid

Yao Zhang
2019 Electronics  
To investigate and handle the impacts of time-delay, a suit of analytical methodology is proposed, where both delay-insensitive and delay-sensitive control strategies of network-based system have their  ...  Experimental results also show the effectiveness of the proposed methodology in droop-controlled AC microgrid system, which provides theoretical guidance on how to use network-based control for the other  ...  The conclusion can be drawn that system is less influential on the time-delay impact in TPM.  ... 
doi:10.3390/electronics8040380 fatcat:ueawns2okvcipatw5wvp643qoq

Mutual learning-based efficient synchronization of neural networks to exchange the neural key

Arindam Sarkar
2021 Complex & Intelligent Systems  
There is an issue of delay in the current techniques in the synchronization assessment that has an impact on the security and privacy of the neural synchronization.  ...  In the absence of a weight vector from another party, the key challenge with neural synchronization is how to assess the coordination of two communication parties.  ...  Acknowledgements The author expressed deep gratitude for the moral and congenial atmosphere support provided by Ramakrishna Mission Vidyamandira, Belur Math, India.  ... 
doi:10.1007/s40747-021-00344-7 fatcat:2fucw5wmyrft3ohiqijbh3f3ni

Information Fusion in Autonomous Vehicle Using Artificial Neural Group Key Synchronization

Mohammad Zubair Khan, Arindam Sarkar, Hamza Ghandorh, Maha Driss, Wadii Boulila
2022 Sensors  
The efficiency of the suggested method is tested, and the results show that it surpasses similar strategies already in use.  ...  Furthermore, in the V2X heterogeneous networks, this paper offers an efficient and effective information fusion security mechanism for multiple sources and multiple type data sharing.  ...  Time Netork delay on a heterogeneous network comprises delay on the DSRC network between cars and RSUs, delay on the Internet between RSUs and key distribution servers, and random delay congestion on the  ... 
doi:10.3390/s22041652 pmid:35214554 pmcid:PMC8875360 fatcat:bcxbhnbmune73lwppj6n5jk63m

A Multi-Agent Framework for Thermal Aware Task Migration in Many-Core Systems

Yang Ge, Qinru Qiu, Qing Wu
2012 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
As the system complexity increases, it is more and more difficult to perform thermal management in a centralized manner because of state explosion and the overhead of monitoring the entire chip.  ...  Experimental results show that, our distributed management policy achieves almost the same performance as a global management policy when the tasks are initially randomly distributed.  ...  impact on the steady state temperature of all other PEs.  ... 
doi:10.1109/tvlsi.2011.2162348 fatcat:vxztslr67jfujkojv4smitsyeu

Nature-Inspired Gravitational Search-Guided Artificial Neural Key Exchange for IoT Security Enhancement

Arindam Sarkar, Moirangthem Marjit Singh, Mohammad Zubair Khan, Omar H. Alhazmi
2021 IEEE Access  
[19] evaluated the impact of the variation of parameters on protection and the success of the different quality learning laws.  ...  The synchronization time is minimized by using the optimum parameters. 4) Designing an optimal neural network structure that enables faster synchronization of neural networks of two IoT devices.  ... 
doi:10.1109/access.2021.3082262 fatcat:4jwy37izkjgejb4kxxs2elu3xi

Distributed task migration for thermal management in many-core systems

Yang Ge, Parth Malani, Qinru Qiu
2010 Proceedings of the 47th Design Automation Conference on - DAC '10  
As the system complexity increases, it is more and more difficult to perform thermal management in a centralized manner because of state explosion and the overhead of monitoring the entire chip.  ...  In the deep submicron era, thermal hot spots and large temperature gradients significantly impact system reliability, performance, cost and leakage power.  ...  The OS switches from one task to another when the time slice expires. The scheduling intervals of different cores do not have to be synchronized.  ... 
doi:10.1145/1837274.1837417 dblp:conf/dac/GeMQ10 fatcat:chwwtjyl2zhzdldbq5kfmruq4m
« Previous Showing results 1 — 15 out of 588 results