1. Password-authenticated key exchange based on RSA;P Mackenzie;International conference on the theory and application of cryptology and information security Springer,2000
2. A Course in Number Theory and Cryptography
3. Public channel cryptography by synchronization of neural networks and chaotic maps;R Mislovaty;Physical review letters,2003
4. Neural cryptography based on generalized tree parity machine for real-life systems;S Jeong,2021
5. Two-layer tree-connected feedforward neural network model for neural cryptography;X Lei;Physical Review E,2013