2022
DOI: 10.1007/978-3-031-20215-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Nonbinary Input Vectors on Security of Tree Parity Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 13 publications
0
0
0
Order By: Relevance
“…By using these parameter selections, it is possible to evaluate how different values of parameter M affect various TPM forms (for M = 1 NBTPM becomes standard TPM defined in [2]) and to determine if parameter M improves the overall security. Furthermore, utilizing the selected parameters enables the attainment of a secure key length of approximately 500 bits [28].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…By using these parameter selections, it is possible to evaluate how different values of parameter M affect various TPM forms (for M = 1 NBTPM becomes standard TPM defined in [2]) and to determine if parameter M improves the overall security. Furthermore, utilizing the selected parameters enables the attainment of a secure key length of approximately 500 bits [28].…”
Section: Methodsmentioning
confidence: 99%
“…Successful synchronization of TPM is a necessary part of key agreement protocol [28]. Both parties need to execute the following steps to distill the cryptographic key as a result of the whole process.…”
Section: Synchronization and Learning Rulesmentioning
confidence: 99%