Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks

H Bojinov, D Sanchez, P Reber, D Boneh… - Communications of the …, 2014 - dl.acm.org
Cryptographic systems often rely on the secrecy of cryptographic keys given to users. Many
schemes, however, cannot resist coercion attacks where the user is forcibly asked by an …

[HTML][HTML] Learning perfectly secure cryptography to protect communications with adversarial neural cryptography

M Coutinho, R de Oliveira Albuquerque, F Borges… - Sensors, 2018 - mdpi.com
Researches in Artificial Intelligence (AI) have achieved many important breakthroughs,
especially in recent years. In some cases, AI learns alone from scratch and performs human …

[PDF][PDF] Fighting coercion attacks in key generation using skin conductance

P Gupta, D Gao - 19th USENIX Security Symposium (USENIX Security …, 2010 - usenix.org
Many techniques have been proposed to generate keys including text passwords, graphical
passwords, biometric data and etc. Most of these techniques are not resistant to coercion …

[HTML][HTML] The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

On limitations of designing usable leakage-resilient password systems: Attacks, principles and usability

Q Yan, J Han, Y Li, H DENG - 2012 - ink.library.smu.edu.sg
The design of leakage-resilient password systems (LRPSes) in the absence of trusted
devices remains a challenging problem today despite two decades of intensive research in …

Neural-Aided Statistical Attack for Cryptanalysis

Y Chen, Y Shen, H Yu - The Computer Journal, 2023 - academic.oup.com
Abstract In Crypto'19, Gohr proposed the first deep learning-based key recovery attack on 11-
round Speck32/64, which opens the direction of neural-aided cryptanalysis. Until now …

Improving differential-neural cryptanalysis

L Zhang, Z Wang - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In CRYPTO'19, Gohr introduced a novel cryptanalysis method by developing a differential-
neural distinguisher using neural networks as the underlying distinguisher. He effectively …

Use of neural networks in cryptography: a review

PP Hadke, SG Kale - … World Conference on Futuristic Trends in …, 2016 - ieeexplore.ieee.org
In cryptography secret information is made unreadable for an unauthorized user. There are
many cryptographic algorithms are available, but they are more complex techniques and …

Dynamically generate a long-lived private key based on password keystroke features and neural network

TY Chang - Information Sciences, 2012 - Elsevier
It is well-known that the protection of long-lived private keys in cryptographic schemes is one
of the most important issues for information security. Any cryptographic scheme that reveals …