[1] BENNETT C H, BRASSARD G, ROBERT J M. Privacy amplification by public discussion[J]. SIAM Journal on Com-puting, 1988, 17(2): 210-229.
[2] BENNETT C H, BRASSARD G, CRéPEAU C, et al. Gen-eralized privacy amplification[J]. IEEE Transactions on In-formation Theory, 1995, 41(6): 1915-1923.
[3] DOLEV S, KORACH E, LI X M, et al. Magnifying comput-ing gaps: establishing encrypted communication over unidi-rectional channels[J]. Theoretical Computer Science, 2016, 636: 17-26.
[4] DOLEV S, FANDINA N, LI X M. Nested Merkle??s puzzles against sampling attacks[C]//LNCS 7763: Proceedings of the 8th International Conference on Information Security and Cryptology, Beijing, Nov 28-30, 2012. Berlin, Heidelberg: Springer, 2012: 157-174.
[5] GOODFELLOW I J, POUGET-ABADIE J, MIRZA M, et al. Generative adversarial networks[C]//Proceedings of the Adv-ances in Neural Information Processing Systems 2014. Cam-bridge: MIT Press, 2014: 2672-2680.
[6] WU J J, ZHANG C L, XUE T F, et al. Learning a probabi-listic latent space of object shapes via 3D generative-advers-arial modeling[C]//Proceedings of the Annual Conference on Neural Information Processing Systems 2016, Barcelona, Dec 5-10, 2016. Cambridge: MIT Press, 2016: 82-90.
[7] ANTIPOV G, BACCOUCHE M, DUGELAY J L. Face ag-ing with conditional generative adversarial networks[C]//Proceedings of the 2017 IEEE International Conference on Image Processing, Beijing, Sep 17-20, 2017. Piscataway: IEEE, 2017: 2089-2093.
[8] XU X H, HUANG J L, WAN J, et al. An integrated method for text information retrieval[C]//Proceedings of the 2008 4th International Conference on Semantics, Knowledge and Grid. Piscataway: IEEE, 2008: 400-403.
[9] HU Z T, YANG Z C, LIANG X D, et al. Toward controlled generation of text[C]//Proceedings of the 34th International Conference on Machine Learning, Sydney, Aug 6-11, 2017: 1587-1596.
[10] ABADI M, ANDERSEN D G. Learning to protect communi-cations with adversarial neural cryptography[J]. arXiv:1610. 06918, 2016.
[11] LI X M, WU J R, WU S Q, et al. Study on fuzzy key encryp-tion based on GAN[J]. Application Research of Computers, 2020, 37(6): 1779-1781.
李西明, 吴嘉润, 吴少乾, 等. 基于生成对抗网络的模糊密钥加密通信研究[J]. 计算机应用研究, 2020, 37(6): 1779-1781.
[12] LI X M, WU J R, WU S Q, et al. Key resilient encryption algorithm based on generative adversarial networks[J]. Com-puter Engineering and Applications, 2020, 56(10): 69-74.
李西明, 吴嘉润, 吴少乾, 等. 基于生成对抗网络的抗泄露加密算法研究[J]. 计算机工程与应用, 2020, 56(10): 69-74.
[13] GOMEZ A N, HUANG S, ZHANG I, et al. Unsupervised cipher cracking using discrete GANs[J]. arXiv:1801.04883v1, 2018.
[14] CIPHER A D, BRIAN J W. Cryptanalysis of shift stream gen-erated stream cipher systems-book review[J]. Cryptologia, 1984, 8(4): 360-363.
[15] SUCHITA D, FABIO D T, MARK S. Vigenère scores for malware detection[J]. Computer Virology and Hacking Te-chniques, 2018, 14(2): 157-165.
[16] XU B, HUANG R T, LI M. Revise saturated activation fun-ctions[J]. arXiv:1602.05980, 2016. |