Neural networks-based cryptography: A survey

I Meraouche, S Dutta, H Tan, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
A current trend of research focuses on artificial intelligence based cryptography which
although proposed almost thirty years ago could not attract much attention. Abadi and …

Learning multi-party adversarial encryption and its application to secret sharing

I Meraouche, S Dutta, SK Mohanty, I Agudo… - IEEE …, 2022 - ieeexplore.ieee.org
Neural networks based cryptography has seen a significant growth since the introduction of
adversarial cryptography which makes use of Generative Adversarial Networks (GANs) to …

Information encryption communication system based on the adversarial networks foundation

Z Li, X Yang, K Shen, R Zhu, J Jiang - Neurocomputing, 2020 - Elsevier
We propose an encryption communication system based on the adversarial networks, called
Adversar; Network Encryption System (ANES), which contains Sender, Receiver and various …

Deep learning-based encryption for secure transmission digital images: A survey

S Rohhila, AK Singh - Computers and Electrical Engineering, 2024 - Elsevier
With the innovation of high-throughput big data storage technology and the construction of
digital information systems in media applications, images are the common and most popular …

Learning asymmetric encryption using adversarial neural networks

I Meraouche, S Dutta, H Tan, K Sakurai - Engineering Applications of …, 2023 - Elsevier
We propose a multi-agent adversarial neural networks model where a sender (Alice) and a
receiver (Bob) are able to learn to use a pair of public/private keys in order to protect their …

Secure multi-party multi-key adversarial cryptography using gan

JJ Justus - 2024 3rd International Conference on Artificial …, 2024 - ieeexplore.ieee.org
The realm of cryptography, rooted in neural networks, has experienced advancements
following the inception of adversarial cryptography. This approach employs Generative …

3-party adversarial steganography

I Meraouche, S Dutta, K Sakurai - International Conference on Information …, 2020 - Springer
Steganography enables a user to hide information by embedding secret messages within
other non-secret texts or pictures. Recently, research along this direction has picked a new …

Cheating detectable ramp secret sharing with optimal cheating resiliency

J Pramanik, S Dutta, PS Roy, A Adhikari - International Conference on …, 2020 - Springer
Abstract A (k, L, n) ramp secret sharing scheme allows a dealer to share a secret vector with
a lesser share size compared to threshold secret sharing schemes. In this work, we …

Tree Parity Machine-Based Symmetric Encryption: A Hybrid Approach

I Meraouche, S Dutta, H Tan, K Sakurai - International Conference on …, 2022 - Springer
In a symmetric key encryption the sender and the receiver must possess the same pre-
distributed key in order to encrypt or decrypt the exchanged messages. Exchanging …

Key exchange using tree parity machines: A survey

I Meraouche, K Sakurai - Proceedings of 2nd International Conference on …, 2022 - Springer
Secure key exchange is an important step to secure a communication. When multiple parties
are using a symmetric key encryption protocol, they need a secret key to exchange …