Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 電機工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/17024
DC FieldValueLanguage
dc.contributor.authorChun-Shun Tsengen_US
dc.contributor.authorYa-Yun Jhengen_US
dc.contributor.authorSih-Yin Shenen_US
dc.contributor.authorJung-Hua Wangen_US
dc.date.accessioned2021-06-04T06:55:05Z-
dc.date.available2021-06-04T06:55:05Z-
dc.date.issued2008-06-01-
dc.identifier.isbn978-1-4244-1822-0-
dc.identifier.issn1089-778X-
dc.identifier.urihttps://ieeexplore.ieee.org/document/4631226-
dc.identifier.urihttp://scholars.ntou.edu.tw/handle/123456789/17024-
dc.description.abstractThis paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and receiver adopt a mirroring process based on an improved Hebbian rule that uses identical random inputs to separately train on their reciprocal outputs to generate a pair of exactly identical secret key strings. Important parameters are elaborately characterized to implement a fast information transmission for ephemeral key exchanging. We show that performance optimization can be achieved by coordinating the parameters. One essential feature of the proposed algorithm is that even an eavesdropper who acquires entire structure of the algorithm and the transmission data still has no chance to decrypt the encrypted message, thus ensuring security in the subsequent encryption task. Moreover, computation load is well bounded in an acceptable range despite the increasing key length.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.subjectCryptographyen_US
dc.subjectStrontiumen_US
dc.subjectSecurityen_US
dc.subjectAlgorithm design and analysisen_US
dc.subjectComputational efficiencyen_US
dc.subjectReceiversen_US
dc.subjectElliptic curve cryptographyen_US
dc.titleFast Symmetric Keys Generation via Mutual Mirroring Processen_US
dc.typeconference paperen_US
dc.relation.conference2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)en_US
dc.relation.conferenceHong Kong, Chinaen_US
dc.identifier.doi10.1109/CEC.2008.4631226-
item.fulltextno fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypeconference paper-
item.grantfulltextnone-
crisitem.author.deptCollege of Electrical Engineering and Computer Science-
crisitem.author.deptDepartment of Electrical Engineering-
crisitem.author.deptNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgNational Taiwan Ocean University,NTOU-
crisitem.author.parentorgCollege of Electrical Engineering and Computer Science-
Appears in Collections:電機工程學系
Show simple item record

Page view(s)

101
Last Week
0
Last month
0
checked on Jun 30, 2025

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback