Neural cryptography with queries for co-operating attackers and effective number of keys | IEEE Conference Publication | IEEE Xplore