Figure 7 - uploaded by Guitouni Zied
Content may be subject to copyright.
Key generation using CNN architecture

Key generation using CNN architecture

Source publication
Article
Full-text available
In the realm of Internet of Things (IoT) systems, the generation of cryptographic keys is crucial for ensuring secure data transmission and device authentication. However, traditional methods of generating random keys encounter challenges about security, efficiency, and scalability, particularly when applied to resource-constrained IoT devices. To...

Contexts in source publication

Context 1
... neural key generation algorithm has been implemented using the RNN architecture. Figure 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. ...
Context 2
... 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. The model demonstrates a low level of validation accuracy and a high loss, indicating that the RNN architecture may struggle to capture the intricate details required for consistent key generation. ...
Context 3
... neural key generation algorithm has been implemented using the RNN architecture. Figure 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. ...
Context 4
... 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. The model demonstrates a low level of validation accuracy and a high loss, indicating that the RNN architecture may struggle to capture the intricate details required for consistent key generation. ...
Context 5
... neural key generation algorithm has been implemented using the RNN architecture. Figure 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. ...
Context 6
... 7 displays the precision and loss curves for the implemented algorithm. Based on the observations depicted in Figure 7, it appears that relying solely on the RNN architecture may not be adequate for efficient key generation. The model demonstrates a low level of validation accuracy and a high loss, indicating that the RNN architecture may struggle to capture the intricate details required for consistent key generation. ...

Similar publications

Article
Full-text available
Acute influenza-associated encephalopathy/encephalitis (IAE) in children and adults is not so common but very serious and sometimes fatal neurological complication. The purpose was to show clinical and laboratorial peculiarities in this condition and to indicate some prognostic factors.
Book
Full-text available
تاثير الحجم الحبيبي في توزيع العناصر الرئيسة والاثرية للاحجام المختلفة من الحجري الرمادي لتكوين المقدادية