2016 New Trends in Signal Processing (NTSP) 2016
DOI: 10.1109/ntsp.2016.7747782
|View full text |Cite
|
Sign up to set email alerts
|

Synchronization of two tree parity machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…The number of iterations is not fixed and depends on the size and parameters of the TPM. However, it is shown that the time is finite and can be easily estimated by users [18]. The process takes longer for larger TPM sizes (K and N) and maximum weight value (L).…”
Section: B Key Agreement Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…The number of iterations is not fixed and depends on the size and parameters of the TPM. However, it is shown that the time is finite and can be easily estimated by users [18]. The process takes longer for larger TPM sizes (K and N) and maximum weight value (L).…”
Section: B Key Agreement Protocolmentioning
confidence: 99%
“…TPMs has been studied extensively. Javurek and M. Turčaník [18] and Martínez Padilla et al [20] identify four distinct types of attacks that TPM may be vulnerable to as follows.…”
Section: Security Of Tree Parity Machinesmentioning
confidence: 99%
“…Taking into account the software environments and hardware resources currently available, the usage of TPM-based error correction seems to be justified. Although the time of learning processes for software implementations of TPMs strongly depends on the hardware resources, a typical duration of one iteration on an ordinary computer is a few milliseconds [39]. However, hardware implementation helps to shorten this time by more than thousandfold (i.e.…”
Section: Applicability Of Tpmsmentioning
confidence: 99%
“…However, error correction based on TPMs is able to equalize every number of incompatible bits between Alice and Bob's strings of bits and it works on any value of QBER. Also, it is worth remembering that we should use high values for TPM parameters (N, K, L) to ensure an even higher level of protection [39].…”
Section: Security Considerationsmentioning
confidence: 99%