|
|
|
Behrouz Zolfaghari and Takeshi Koshiba
In recent years, neural networks and cryptographic schemes have come together in war and peace; a cross-impact that forms a dichotomy deserving a comprehensive review study. Neural networks can be used against cryptosystems; they can play roles in crypta...
ver más
|
|
|
|
|
|
|
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev and Evgeny Kostuchenko
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user?s face is converted to parameters that later are used in a recognition process. On the o...
ver más
|
|
|
|
|
|
|
Konstantin Isupov
Residue number system (RNS) is known for its parallel arithmetic and has been used in recent decades in various important applications, from digital signal processing and deep neural networks to cryptography and high-precision computation. However, compa...
ver más
|
|
|
|
|
|
|
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k...
ver más
|
|
|
|