메뉴 건너뛰기




Volumn 6, Issue SUPPL5, 2013, Pages 4560-4566

An application of non-uniform cellular automata for efficient cryptography

Author keywords

Cryptographic system; NRCA non reversible CA; Pseudorandom number; RCA reversible cellular automata

Indexed keywords


EID: 84879374662     PISSN: 09746846     EISSN: 09745645     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (157)

References (10)
  • 1
    • 0003855464 scopus 로고    scopus 로고
    • Applied cryptography
    • Wiley, New York
    • Schneier B (1996). Applied cryptography, Wiley, New York.
    • (1996)
    • Schneier, B.1
  • 2
    • 84896972868 scopus 로고    scopus 로고
    • LCASE: Lightweight Cellular Lightweight Cellular Automata-based Symmetric-key Encryption
    • Tripathy S, and Nandi S (2009). LCASE: Lightweight Cellular Lightweight Cellular Automata-based Symmetric-key Encryption, International Journal of Network Security, vol 8(2), 243-252.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 243-252
    • Tripathy, S.1    Nandi, S.2
  • 3
    • 0002353129 scopus 로고    scopus 로고
    • A brief history of cellular automata
    • Sarkar P (2000). A brief history of cellular automata, Journal of ACM Computing Surveys (CSUR), vol 32(1), 80-107.
    • (2000) Journal of ACM Computing Surveys (CSUR) , vol.32 , Issue.1 , pp. 80-107
    • Sarkar, P.1
  • 4
    • 84992720189 scopus 로고
    • Cryptography with cellular automata
    • Crypto '85, LNCS 218, Springer-verlag
    • Wolfram S (1986). Cryptography with cellular automata, Crypto '85, LNCS 218, Springer-verlag, 429-432.
    • (1986) , pp. 429-432
    • Wolfram, S.1
  • 5
    • 46149128523 scopus 로고
    • Random sequence generation by cellular automata
    • Wolfram S (1986). Random sequence generation by cellular automata, Advances in Applied Mathematics, vol 7(2), 123-169.
    • (1986) Advances in Applied Mathematics , vol.7 , Issue.2 , pp. 123-169
    • Wolfram, S.1
  • 6
    • 2642563715 scopus 로고    scopus 로고
    • Cellular automata computations and secret key cryptography
    • Seredynski F, Bouvry P et al. (2004). Cellular automata computations and secret key cryptography, Parallel Computing Journal, vol 30(5-6), 753-766.
    • (2004) Parallel Computing Journal , vol.30 , Issue.5-6 , pp. 753-766
    • Seredynski, F.1    Bouvry, P.2
  • 7
    • 35048901993 scopus 로고    scopus 로고
    • ICEBERG : An involutional cipher efficient for block encryption in reconfigurable hard- ware
    • Springer- verlag
    • Standaert F, Piret G et al. (2004). ICEBERG : An involutional cipher efficient for block encryption in reconfigurable hard- ware, FSE '04, LNCS 3017, Springer- verlag, 279-299.
    • (2004) FSE '04 LNCS 3017 , pp. 279-299
    • Standaert, F.1    Piret, G.2
  • 8
    • 17444420720 scopus 로고    scopus 로고
    • High speed networking security: Design and implementation of two new DDP-based ciphers
    • Sklavos N, Moldovyan N A et al. (2005). High speed networking security: Design and implementation of two new DDP-based ciphers, Mobile Networks and Applications-MONET, vol 25(1-2), 219-231.
    • (2005) Mobile Networks and Applications-MONET , vol.25 , Issue.1-2 , pp. 219-231
    • Sklavos, N.1    Moldovyan, N.A.2
  • 10
    • 0001566941 scopus 로고    scopus 로고
    • Invertible cellular automata: A review
    • (Reprinted with correction as of Oct)
    • Toffoli T, and Margolus N (2001). Invertible cellular automata: A review, Physica D, vol 45(1-3), 229-253, (Reprinted with correction as of Oct).
    • (2001) Physica D , vol.45 , Issue.1-3 , pp. 229-253
    • Toffoli, T.1    Margolus, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.