메뉴 건너뛰기




Volumn 1255, Issue , 1997, Pages 250-262

Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CELLULAR AUTOMATA; ERROR CORRECTION; ERRORS; ITERATIVE METHODS;

EID: 0012279808     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-63163-1_20     Document Type: Conference Paper
Times cited : (14)

References (13)
  • 1
    • 46149128523 scopus 로고
    • Random sequence generation by cellular automata
    • S. Wolfram, “Random sequence generation by cellular automata”, Advances in Applied Mathematics 7, pp. 123-169, 1986.
    • (1986) Advances in Applied Mathematics , vol.7 , pp. 123-169
    • Wolfram, S.1
  • 2
    • 84992720189 scopus 로고
    • Cryptography with cellular automata
    • S. Wolfram, “Cryptography with cellular automata”, Lecture Notes in Computer Science, vol. 218, pp. 429-432, 1986.
    • (1986) Lecture Notes in Computer Science , vol.218 , pp. 429-432
    • Wolfram, S.1
  • 3
    • 85013632897 scopus 로고
    • Analysis of pseudo random sequences generated by cellular automata
    • W. Meier and O. Staffelbach, “Analysis of pseudo random sequences generated by cellular automata”, Lecture Notes in Computer Science, vol. 547, pp. 186-199, 1992.
    • (1992) Lecture Notes in Computer Science , vol.547 , pp. 186-199
    • Meier, W.1    Staffelbach, O.2
  • 4
    • 0024012004 scopus 로고
    • The first ten years of public-key cryptography
    • W. Diffie, “The first ten years of public-key cryptography”, Proc. IEEE, pp. 560-577, 1988.
    • (1988) Proc. IEEE , pp. 560-577
    • Diffie, W.1
  • 6
    • 0027555036 scopus 로고
    • Vector space theoretic analysis of additive cellular automata and its applications for pseudo-exhaustive test pattern generation
    • A.K. Das and P. Pal Chaudhuri, “Vector space theoretic analysis of additive cellular automata and its applications for pseudo-exhaustive test pattern generation”, IEEE Trans. Comput., vol. 42, no. 3 pp. 340-352, Mar. 1993.
    • (1993) IEEE Trans. Comput , vol.42 , Issue.3 , pp. 340-352
    • Das, A.K.1    Pal Chaudhuri, P.2
  • 7
    • 0028750092 scopus 로고
    • Theory and applications of cellular automata in cryptography
    • Dec
    • S. Nandi, B.K. Kar, and P. Pal Chaudhuri, “Theory and applications of cellular automata in cryptography”, IEEE Trans. Comput., vol. 43, no. 12, pp. 1346-1357, Dec. 1994.
    • (1994) IEEE Trans. Comput , vol.43 , Issue.12 , pp. 1346-1357
    • Nandi, S.1    Kar, B.K.2    Pal Chaudhuri, P.3
  • 8
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • Jan
    • T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. Comput, vol. C-34, no. 1, pp. 81-85, Jan. 1985.
    • (1985) IEEE Trans. Comput , vol.C-34 , Issue.1 , pp. 81-85
    • Siegenthaler, T.1
  • 9
    • 84873998819 scopus 로고
    • A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function, Advances in Cryptology – ASIACRYPT ‘94
    • M. Mihaljević, “A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function”, Advances in Cryptology – ASIACRYPT ‘94, Lecture Notes in Computer Science, vol. 917, pp. 67-79, 1995.
    • (1995) Advances in Cryptology – ASIACRYPT ‘94, Lecture Notes in Computer Science , vol.917 , pp. 67-79
    • Mihaljević, M.1
  • 10
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • J. Golić and M. Mihaljević, “ A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance”, Journal of Cryptology, vol. 3, pp. 201-212, 1991.
    • (1991) Journal of Cryptology , vol.3 , pp. 201-212
    • Golić, J.1    Mihaljević, M.2
  • 11
    • 85032480688 scopus 로고
    • A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence, Advances in Cryptology – AUSCRYPT ‘90
    • M. Mihaljević and J. Golić, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Cryptology – AUSCRYPT ‘90, Lecture Notes in Computer Science, vol. 453, pp. 165-175, 1990.
    • (1990) Advances in Cryptology – AUSCRYPT ‘90, Lecture Notes in Computer Science , vol.453 , pp. 165-175
    • Mihaljević, M.1    Golić, J.2
  • 13
    • 33745992035 scopus 로고
    • Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence, Advances in Cryptology – EUROCRYPT ‘92
    • M. Mihaljević and J. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence”, Advances in Cryptology – EUROCRYPT ‘92, Lecture Notes in Computer Science, vol. 658, pp. 124-137, 1993.
    • (1993) Advances in Cryptology – EUROCRYPT ‘92, Lecture Notes in Computer Science , vol.658 , pp. 124-137
    • Mihaljević, M.1    Golić, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.