{"id":"https://openalex.org/W2011426551","doi":"https://doi.org/10.1109/ic3.2013.6612177","title":"Public key cryptography using neural networks and genetic algorithms","display_name":"Public key cryptography using neural networks and genetic algorithms","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2011426551","doi":"https://doi.org/10.1109/ic3.2013.6612177","mag":"2011426551"},"language":"en","primary_location":{"id":"doi:10.1109/ic3.2013.6612177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015372838","display_name":"Smita Jhajharia","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Smita Jhajharia","raw_affiliation_strings":["Department of Computer Engineering, Delhi Technological University, Delhi, India","Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Delhi Technological University, Delhi, India","institution_ids":["https://openalex.org/I863896202"]},{"raw_affiliation_string":"Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086543174","display_name":"Swati Mishra","orcid":"https://orcid.org/0009-0004-3776-8758"},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Swati Mishra","raw_affiliation_strings":["Department of Computer Engineering, Delhi Technological University, Delhi, India","Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Delhi Technological University, Delhi, India","institution_ids":["https://openalex.org/I863896202"]},{"raw_affiliation_string":"Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India","institution_ids":["https://openalex.org/I863896202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019923381","display_name":"Siddharth Bali","orcid":null},"institutions":[{"id":"https://openalex.org/I863896202","display_name":"Delhi Technological University","ror":"https://ror.org/01ztcvt22","country_code":"IN","type":"education","lineage":["https://openalex.org/I863896202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Siddharth Bali","raw_affiliation_strings":["Department of Computer Engineering, Delhi Technological University, Delhi, India","Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Delhi Technological University, Delhi, India","institution_ids":["https://openalex.org/I863896202"]},{"raw_affiliation_string":"Dept. of Comput. Eng., Delhi Technol. Univ., New Delhi, India","institution_ids":["https://openalex.org/I863896202"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015372838"],"corresponding_institution_ids":["https://openalex.org/I863896202"],"apc_list":null,"apc_paid":null,"fwci":1.9236,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.87893402,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"137","last_page":"142"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10320","display_name":"Neural Networks and Applications","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6457827091217041},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6321104764938354},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6191657185554504},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.5460701584815979},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5438739061355591},{"id":"https://openalex.org/keywords/initialization","display_name":"Initialization","score":0.5218233466148376},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.5053761601448059},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4729684889316559},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.4635002315044403},{"id":"https://openalex.org/keywords/fitness-function","display_name":"Fitness function","score":0.4426882565021515},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43570995330810547},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41097304224967957},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34126752614974976},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23284873366355896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6457827091217041},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6321104764938354},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6191657185554504},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.5460701584815979},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5438739061355591},{"id":"https://openalex.org/C114466953","wikidata":"https://www.wikidata.org/wiki/Q6034165","display_name":"Initialization","level":2,"score":0.5218233466148376},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.5053761601448059},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4729684889316559},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.4635002315044403},{"id":"https://openalex.org/C176066374","wikidata":"https://www.wikidata.org/wiki/Q629118","display_name":"Fitness function","level":3,"score":0.4426882565021515},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43570995330810547},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41097304224967957},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34126752614974976},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23284873366355896},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3.2013.6612177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3.2013.6612177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 Sixth International Conference on Contemporary Computing (IC3)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W804507708","https://openalex.org/W1553154632","https://openalex.org/W1564219727","https://openalex.org/W1967121105","https://openalex.org/W2532834841"],"related_works":["https://openalex.org/W3044825010","https://openalex.org/W4312680597","https://openalex.org/W2795569938","https://openalex.org/W3134921237","https://openalex.org/W95325373","https://openalex.org/W2032644301","https://openalex.org/W2344061241","https://openalex.org/W2166239524","https://openalex.org/W236957874","https://openalex.org/W2772380824"],"abstract_inverted_index":{"By":[0],"making":[1,179],"use":[2,47,131],"of":[3,22,29,48,56,65,95,121,132,167,195,234,253,270,272],"Artificial":[4,24],"Intelligence":[5,8],"(AI),":[6],"Human":[7],"can":[9],"be":[10,226,284],"simulated":[11],"by":[12,119,219,259],"a":[13,102,162,181],"machine,":[14],"Neural":[15,25],"Networks":[16,26],"is":[17,99,145,175,274],"one":[18],"such":[19],"sub":[20],"field":[21,64],"AI.":[23],"(ANN)":[27],"consists":[28],"neurons":[30],"and":[31,59,82,110,151,209,228,265,296,302],"weights":[32],"assigned":[33],"to":[34,52,78,91,104,158,161,225,293],"inter":[35],"neuron":[36],"connections":[37],"helps":[38,190],"in":[39,86,153,191,198],"storing":[40],"the":[41,54,63,159,213,238,251,255,279],"acquired":[42],"knowledge.":[43],"This":[44,112,276],"paper":[45,113],"makes":[46],"Hebbian":[49],"learning":[50],"rule":[51],"train":[53],"ANN":[55,87,122,133],"both":[57],"sender":[58],"receiver":[60],"machines.":[61],"In":[62],"Public":[66],"Key":[67],"Cryptography":[68],"(PKC),":[69],"Pseudo":[70],"Random":[71],"Number":[72],"Generator":[73],"(PRNG)":[74],"are":[75,89,222],"widely":[76],"used":[77,85],"generate":[79],"unique":[80],"keys":[81],"random":[83,196,227,256],"numbers":[84,168,197,214],"which":[88],"found":[90],"possess":[92,105],"many":[93],"types":[94],"possible":[96],"attacks.":[97],"It":[98,127],"essential":[100,244],"for":[101,107,117,148,185,247],"key":[103,108,115,281],"randomness":[106],"strength":[109],"security.":[111],"proposes":[114],"generation":[116],"PKC":[118],"application":[120],"using":[123],"Genetic":[124],"Algorithm":[125],"(GA).":[126],"was":[128,291],"noticed":[129],"that":[130,278],"along":[134],"with":[135],"GA":[136,143,156,180,202,220],"has":[137],"not":[138],"as":[139,242],"yet":[140],"been":[141],"explored.":[142],"approach":[144],"often":[146],"applied":[147],"obtaining":[149],"optimization":[150],"solutions":[152],"search":[154,193],"problems.":[155],"correlates":[157],"nature":[160],"large":[163],"extent":[164],"producing":[165],"population":[166],"where":[169],"number":[170,236,257,269],"possessing":[171],"higher":[172],"fitness":[173],"value":[174],"replicated":[176],"more.":[177],"Thus,":[178],"very":[182],"good":[183],"contender":[184],"PRNGs.":[186],"Good":[187],"Fitness":[188],"function":[189],"exploring":[192],"space":[194],"more":[199],"efficient":[200],"manner.":[201],"PRNGs":[203],"result":[204],"samples":[205],"satisfies":[206],"frequency":[207],"test":[208],"gap":[210],"test.":[211],"Thus":[212],"generated":[215,258,282],"after":[216],"each":[217],"iteration":[218],"PRNG":[221],"statistically":[223],"verified":[224],"nonrepeating,":[229],"having":[230,300],"no":[231],"prior":[232],"relation":[233],"next":[235],"from":[237,286],"previous":[239],"ones,":[240],"acting":[241],"an":[243],"initialization":[245],"parameter":[246],"neural":[248],"algorithm":[249,290],"overcomes":[250],"problem":[252],"acknowledging":[254],"traditional":[260],"PRNG.":[261],"For":[262],"generating":[263],"public":[264,287],"private":[266,280],"keys,":[267],"different":[268],"rounds":[271],"mixing":[273],"used.":[275],"ensures":[277],"cannot":[283],"derived":[285],"key.":[288],"Our":[289],"observed":[292],"give":[294],"fast":[295],"improved":[297],"performance":[298],"results":[299],"practical":[301],"feasible":[303],"implementation.":[304]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
