The dichotomy of neural networks and cryptography: war and peace

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
In recent years, neural networks and cryptographic schemes have come together in war and
peace; a cross-impact that forms a dichotomy deserving a comprehensive review study …

AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

Colour image encryption based on customized neural network and DNA encoding

S Patel, V Thanikaiselvan, D Pelusi, B Nagaraj… - Neural Computing and …, 2021 - Springer
Cryptography is a method for secure communication by hiding information with secret keys
so that only authorised users can read and process it. Efficient random sequence generators …

The Dichotomy of Crypto and NN: War and Peace

B Zolfaghari, H Nemati, N Yanai, K Bibak - Crypto and AI: From …, 2023 - Springer
In recent years, NNs, as the basic components in AI models and cryptographic schemes,
have come together in war and peace; a cross-impact forms a dichotomy deserving a …

[图书][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

Designing an expert system for industrial energy management in Tanzania

A Mwangaila, IWR Taifa… - International Journal of …, 2023 - inderscienceonline.com
This study designed an expert system (ES) to assist energy management (EM) in
manufacturing industries. The EM system optimises energy to maximise profits. One of the …

Comparative study of self-organizing map and deep self-organizing map using MATLAB

DI Kumar, MR Kounte - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
We are interested in testing the efficiency of different algorithm which are traditional SOM
(self-organizing map) and new DSOM (deep self-organizing map) for image cataloging …

Colour image encryption based on fisher-yates algorithm and chaotic maps

RV Ravi, SB Goyal, C Djeddi - Mediterranean Conference on Pattern …, 2021 - Springer
Due to its highly sensitive initial values and parameters and complicated features such as
ergodicity and pseudorandomness, chaos-based systems are extensively used in digital …

Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible keys

ET Khalaf, MN Mohammad, K Moorthy… - Advanced Science …, 2018 - ingentaconnect.com
The security of stored templates has become an important issue in biometric authentication
systems this because most of the biometric attacks target the biometric database beside the …

Crypto and AI

B Zolfaghari, H Nemati, N Yanai, K Bibak - Springer
After some introductory discussions in Sect. 1.1, this chapter studies the role of AI in the
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …