The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

Hardware Components for Nonlinear Neuro-like Data Protection in Mobile Smart Systems

I Tsmots, R Tkachenko, V Teslyuk… - 2022 IEEE 17th …, 2022 - ieeexplore.ieee.org
Rapid grows and expansion smart systems application, wide use data transmission
networks require cryptographic protection of such data. Graph model of nonlinear neuro-like …

The method and simulation model of element base selection for protection system synthesis and data transmission

I Tsmots, V Teslyuk, T Teslyuk… - International Journal of …, 2021 - ingentaconnect.com
Background: The modern stage of the development data protection and transmission
systems is characterized by an extension of the application areas, most of which require …

Bithreshold neural network classifier

V Kotsovsky, F Geche, A Batyuk - 2020 IEEE 15th international …, 2020 - ieeexplore.ieee.org
The fully connected 2-layer feedforward network architecture with the hidden layer
consisting of bithreshold neurons is considered in the paper. We design the neural network …

Development of a generalized model for parallel-streaming neural element and structures for scalar product calculation devices

I Tsmots, V Teslyuk, N Kryvinska, O Skorokhoda… - The Journal of …, 2023 - Springer
Nowadays, intensive streams of fuzzy input data need to be processed in real-time for
different fields of science and engineering. To solve this problem, a generalized model for …

The computation power and capacity of bithreshold neurons

V Kotsovsky, A Batyuk, I Mykoriak - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
The paper deals with the issues concerning the expressive power of bithreshold neurons.
We study how many Boolean functions of n variables can be computed by using bithreshold …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

[PDF][PDF] Method of Training and Implementation on the Basis of Neural Networks of Cryptographic Data Protection.

I Tsmots, V Teslyuk, Y Lukashchuk, Y Opotiak - COLINS, 2022 - ceur-ws.org
The analysis of publications is carried out, which indicates the urgency of the problem of
cryptographic encryption and decryption of real-time data for mobile robotic systems. The …

Method and means of symmetric real-time neural network data encryption

V Rabyk, I Tsmots, Z Lyubun… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
The training of the auto-associative neural network by the method of principal components
analysis has been conducted and the matrix of weight coefficients has been calculated. A …

[图书][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …