Using neural network in cryptography.
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61988987%3A17310%2F00%3A00000029" target="_blank" >RIV/61988987:17310/00:00000029 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Using neural network in cryptography.
Original language description
The goal of cryptography is to make it impossible to take a cipher and reproduce the original plain text without the corresponding key. With good cryptography, your messages are encrypted in such a way that brute force attacks against the algorithm or the key are all but impossible. Good cryptography gets its security by using incredibly long keys and by using encryption algorithms that are resistant to other form of attack. The neural net application represents a way of the next development in good cryptography encryption algorithms that are resistant to other form of attack. The neural net application represents a way of the next development in good cryptography
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
—
Continuities
Z - Vyzkumny zamer (s odkazem do CEZ)
Others
Publication year
2000
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Advances in Sift Computing
ISBN
3-7908-1322-2
ISSN
—
e-ISSN
—
Number of pages
7
Pages from-to
—
Publisher name
Physica-Verlag, A Springer -Verlag Company
Place of publication
Košice, Slovakia
Event location
—
Event date
—
Type of event by nationality
—
UT code for WoS article
—