메뉴 건너뛰기




Volumn 93, Issue 1-3, 2006, Pages 215-236

On the use of cellular automata in symmetric cryptography

Author keywords

Automata; Cryptography; Finite fields; Sequence generator

Indexed keywords

CONCATENATION; FINITE FIELDS; PSEUDORANDOM SEQUENCE GENERATORS; SEQUENCE GENERATOR;

EID: 33749455799     PISSN: 01678019     EISSN: 15729036     Source Type: Journal    
DOI: 10.1007/s10440-006-9041-6     Document Type: Article
Times cited : (30)

References (25)
  • 1
    • 0034187228 scopus 로고    scopus 로고
    • An architecture for computing Zech's logarithms in GF(2m)
    • Assis, F., Pedreira, C.: An architecture for computing Zech's logarithms in GF(2m). IEEE Trans. Comput. 49(5), 519-524 (2000)
    • (2000) IEEE Trans. Comput. , vol.49 , Issue.5 , pp. 519-524
    • Assis, F.1    Pedreira, C.2
  • 2
    • 63449086263 scopus 로고    scopus 로고
    • Crytanalysis of a new cellular automata cryptosystem. 8th Australasian Conference on Information Security and Privacy - ACISP 2003
    • Springer, Berlin Heidelberg New York
    • Bao, F.: Crytanalysis of a new cellular automata cryptosystem. 8th Australasian Conference on Information Security and Privacy - ACISP 2003. Lecture Notes in Computer Science, vol. 2727, pp. 416-427. Springer, Berlin Heidelberg New York (2003)
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 416-427
    • Bao, F.1
  • 3
    • 0031366921 scopus 로고    scopus 로고
    • Comments on 'Theory and applications of cellular automata in cryptography
    • Blackburn, S., Merphy, S., Paterson, K.: Comments on 'Theory and applications of cellular automata in cryptography'. IEEE Trans. Comput. 46, 637-638 (1997)
    • (1997) IEEE Trans. Comput. , vol.46 , pp. 637-638
    • Blackburn, S.1    Merphy, S.2    Paterson, K.3
  • 4
    • 0012523847 scopus 로고    scopus 로고
    • Analysis of one-dimensional linear hybrid cellular automata over GF(q)
    • Cattell, K., Muzio, J.: Analysis of one-dimensional linear hybrid cellular automata over GF(q). IEEE Trans. Comput. 45(7), 782-792 (1996)
    • (1996) IEEE Trans. Comput. , vol.45 , Issue.7 , pp. 782-792
    • Cattell, K.1    Muzio, J.2
  • 6
    • 0029293916 scopus 로고
    • Minimal cost one-dimensional linear hybrid cellular automata of degree through 500
    • Cattell, K., Shujian, Z.: Minimal cost one-dimensional linear hybrid cellular automata of degree through 500. J. Electron. Test.: Theory Appl. 6, 255-258 (1995)
    • (1995) J. Electron. Test.: Theory Appl. , vol.6 , pp. 255-258
    • Cattell, K.1    Shujian, Z.2
  • 7
    • 33749498290 scopus 로고
    • A linear cellular automata algorithm: Theory. Department of Computer Science
    • University of Victoria, Canada, DCS-161-IR
    • Cattell, K., Muzio, J.: A linear cellular automata algorithm: Theory. Department of Computer Science. University of Victoria, Canada, Tech. Rep. DCS-161-IR, 1991
    • (1991) Tech. Rep.
    • Cattell, K.1    Muzio, J.2
  • 8
    • 84974670663 scopus 로고
    • The shrinking generator. Advances in Cryptology -CRYPTO'93
    • Springer, Berlin Heidelberg New York
    • Coppersmith, D., Krawczyk H., Mansour, Y.: The shrinking generator. Advances in Cryptology -CRYPTO'93. Lecture Notes in Computer Science, vol. 773, pp. 22-39. Springer, Berlin Heidelberg New York (1994)
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 9
    • 35048842371 scopus 로고    scopus 로고
    • Computing phase shifts of maximum-length 90/150 Cellular automata sequences
    • Proc. of ACRI 2004. Springer, Berlin Heidelberg New York
    • Cho, S., Un-Sook, C., Yoon-Hee, H.: Computing phase shifts of maximum-length 90/150 Cellular automata sequences. Proc. of ACRI 2004. Lecture Notes on Computer Science, vol. 3305, pp. 31-39. Springer, Berlin Heidelberg New York (2004)
    • (2004) Lecture Notes on Computer Science , vol.3305 , pp. 31-39
    • Cho, S.1    Un-Sook, C.2    Yoon-Hee, H.3
  • 12
    • 0029274505 scopus 로고
    • Theory and applications of q-ary interleaved sequences
    • Gong, G.: Theory and applications of q-ary interleaved sequences. IEEE Trans. Inform. Theory 41, 400-411 (1995)
    • (1995) IEEE Trans. Inform. Theory , vol.41 , pp. 400-411
    • Gong, G.1
  • 13
    • 30344442884 scopus 로고
    • A cryptanalysis of clock-controlled shift registers with multiple steps
    • Golic, J., O'Connors, L.: A cryptanalysis of clock-controlled shift registers with multiple steps. Cryptography: Policy and Algorithms 41, 174-185 (1995)
    • (1995) Cryptography: Policy and Algorithms , vol.41 , pp. 174-185
    • Golic, J.1    O'Connors, L.2
  • 14
    • 84947776392 scopus 로고    scopus 로고
    • Complexity correlation attacks on two clock-controlled Generators
    • Proc. of Asiacrypt'98. Springer, Berlin Heidelberg New York
    • Johansson, T.: Complexity correlation attacks on two clock-controlled Generators. Proc. of Asiacrypt'98. Lecture Notes in Computer Science, vol. 1426, pp. 342-356. Springer, Berlin Heidelberg New York (1998)
    • (1998) Lecture Notes in Computer Science , vol.1426 , pp. 342-356
    • Johansson, T.1
  • 15
    • 33749481248 scopus 로고    scopus 로고
    • Clock-controlled shrinking generator of feedback shift registers
    • 8th Australasian Conference on Information Security and Privacy - ACISP 2003. Springer, Berlin Heidelberg New York
    • Kanso, A.: Clock-controlled shrinking generator of feedback shift registers. 8th Australasian Conference on Information Security and Privacy - ACISP 2003. Lecture Notes in Computer Science, vol. 2727, pp. 443-451. Springer, Berlin Heidelberg New York (2003)
    • (2003) Lecture Notes in Computer Science , vol.2727 , pp. 443-451
    • Kanso, A.1
  • 17
  • 19
    • 0028750092 scopus 로고
    • Theory and applications of cellular automata in cryptography
    • Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and applications of cellular automata in cryptography. IEEE Trans. Comput. 43, 1346-1357 (1994)
    • (1994) IEEE Trans. Comput. , vol.43 , pp. 1346-1357
    • Nandi, S.1    Kar, B.K.2    Chaudhuri, P.P.3
  • 22
    • 84956857565 scopus 로고    scopus 로고
    • Clock-a probabilistic correlation attack on the shrinking generator
    • Proc. of Australasian Conference on Information Security and Privacy - ACISP 1998. Springer, Berlin Heidelberg New York
    • Simpson, L. et al. Clock-a probabilistic correlation attack on the shrinking generator. Proc. of Australasian Conference on Information Security and Privacy - ACISP 1998. Lecture Notes in Computer Science, vol. 1438, pp. 147-158. Springer, Berlin Heidelberg New York (1998)
    • (1998) Lecture Notes in Computer Science , vol.1438 , pp. 147-158
    • Simpson, L.1
  • 23
    • 46149128523 scopus 로고    scopus 로고
    • Random sequence generation by cellular automata
    • Wolfram, S.: Random sequence generation by cellular automata. Adv. Appl. Math. 7(123), (1986)
    • Adv. Appl. Math. , vol.7 , Issue.123 , pp. 1986
    • Wolfram, S.1
  • 24
    • 33745963860 scopus 로고
    • Cryptography with cellular automata. Advances in Cryptology - CRYPTO'85
    • Springer, Berlin Heidelberg New York
    • Wolfram, S.: Cryptography with cellular automata. Advances in Cryptology - CRYPTO'85. Lecture Notes in Computer Science, vol. 218, pp. 22-39. Springer, Berlin Heidelberg New York (1994)
    • (1994) Lecture Notes in Computer Science , vol.218 , pp. 22-39
    • Wolfram, S.1
  • 25
    • 0029492743 scopus 로고
    • Quantitative analysis for linear hybrid CA and LFSR as BIST generators for sequential faults
    • Zhang, S.: Quantitative analysis for linear hybrid CA and LFSR as BIST generators for sequential faults. J. Electron. Test. 7(3), 209-221 (1995)
    • (1995) J. Electron. Test. , vol.7 , Issue.3 , pp. 209-221
    • Zhang, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.