no code implementations • 8 Feb 2018 • Piotr Antonik, Marvyn Gulina, Jaël Pauwels, Serge Massar
We then show that trained reservoir computers can be used to crack chaos based cryptography and illustrate this on a chaos cryptosystem based on the Mackey-Glass system.