Szczegóły publikacji

Opis bibliograficzny

Performance of computing hash-codes with chaotically-trained artificial neural networks / Jacek Tchórzewski, Aleksander BYRSKI // W: Computational Science – ICCS 2022 : 22nd international conference : London, UK, June 21–23, 2022 : proceedings, Pt. 2 / eds. Derek Groen, [et al.]. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Computer Science ; ISSN 0302-9743 ; LNCS 13351). — ISBN: 978-3-031-08753-0; e-ISBN: 978-3-031-08754-7. — S. 408–421. — Bibliogr., Abstr. — Publikacja dostępna online od: 2022-06-15. — J. Tchórzewski - afiliacja: Cracow University of Technology, Kraków


Autorzy (2)


Słowa kluczowe

artificial neural networkshashing algorithmhashing efficiencyscalable cryptography algorithm

Dane bibliometryczne

ID BaDAP140669
Data dodania do BaDAP2022-06-24
DOI10.1007/978-3-031-08754-7_48
Rok publikacji2022
Typ publikacjimateriały konferencyjne (aut.)
Otwarty dostęptak
WydawcaSpringer
Konferencja22nd International Conference on Computational Science
Czasopismo/seriaLecture Notes in Computer Science

Abstract

The main goal of the research presented in this paper was to estimate the performance of applying neural networks trained with the usage of a chaotic model, that may serve as hashing functions. The Lorenz Attractor chaotic model was used for training data preparation, and Scaled Conjugate Gradient was used as a training algorithm. Networks consisted of two layers: a hidden layer with sigmoid neurons and an output layer with linear neurons. The method of bonding the input message with chaotic formula is presented. Created networks could return 256 or 512 bits of hash, however, this parameter can be easily adjusted before the training process. The performance analysis of networks is discussed (that is the time of hash computation) in comparison with popular standards SHA-256 and SHA-512 under the MATLAB environment. Further research may include analysis of networks’ training parameters (like mean squared error or gradient) or analysis of results of the statistical tests performed on networks output. The presented solution may be used as a security algorithm complementary to a certificated one (for example for additional data integrity checking).

Publikacje, które mogą Cię zainteresować

fragment książki
Deep Neural Networks and smooth approximation of PDEs / Kamil Doległo, Maciej PASZYŃSKI, Leszek Demkowicz // W: Computational Science – ICCS 2022 : 22nd international conference : London, UK, June 21–23, 2022 : proceedings, Pt. 2 / eds. Derek Groen, [et al.]. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Computer Science ; ISSN 0302-9743 ; LNCS 13351). — ISBN: 978-3-031-08753-0; e-ISBN: 978-3-031-08754-7. — S. 328–332. — Bibliogr., Abstr. — Publikacja dostępna online od: 2022-06-15
fragment książki
Application of the Hierarchic Memetic Strategy HMS in neuroevolution / Mateusz Sokół, Maciej SMOŁKA // W: Computational Science – ICCS 2022 : 22nd international conference : London, UK, June 21–23, 2022 : proceedings, Pt. 2 / eds. Derek Groen, [et al.]. — Cham : Springer Nature Switzerland, cop. 2022. — (Lecture Notes in Computer Science ; ISSN 0302-9743 ; LNCS 13351). — ISBN: 978-3-031-08753-0; e-ISBN: 978-3-031-08754-7. — S. 422–429. — Bibliogr., Abstr. — Publikacja dostępna online od: 2022-06-15