Research Article

Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems

Figure 2

Architecture of sharing the key by using the VVTPM.