메뉴 건너뛰기




Volumn 8, Issue 3, 2009, Pages 243-252

LCASE: Lightweight cellular automata-based symmetric-key encryption

Author keywords

Block cipher; Cellular automata; Lightweight cryptography

Indexed keywords

CELLULAR AUTOMATA; DATA PRIVACY;

EID: 84896972868     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (22)

References (29)
  • 1
    • 84949218850 scopus 로고    scopus 로고
    • Camellia: A 128-bit block cipher suitable for multiple platforms-design and analysis
    • Springer-Verlag, LNCS 2012
    • K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, Camellia: A 128-bit block cipher suitable for multiple platforms- design and analysis, SAC-2000, LNCS 2012, pp. 39-56, Springer-Verlag, 2001.
    • (2001) SAC-2000 , pp. 39-56
    • Aoki, K.1    Ichikawa, T.2    Kanda, M.3    Matsui, M.4    Moriai, S.5    Nakajima, J.6    Tokita, T.7
  • 2
    • 8744301953 scopus 로고    scopus 로고
    • Cryptanalysys of a partially known cellular automata cryptosystem
    • F. Bao, Cryptanalysys of a partially known cellular automata cryptosystem, IEEE Transactions on Computers, vol. 53, no. 11, pp. 1493-1497, 2004.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.11 , pp. 1493-1497
    • Bao, F.1
  • 3
    • 0026397734 scopus 로고
    • Differential cryptanalysis of DES like cyptosystems
    • E. Biham, and A. Shamir, Differential cryptanalysis of DES like cyptosystems, Journal of Cryptology, vol. 4, pp. 3-72, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 4
    • 0028494723 scopus 로고
    • New types of cryptanalytic attacks using related keys
    • Springer-Verlag, LNCS 765
    • E. Biham, 'New types of cryptanalytic attacks using related keys, Eurocrypt '93, LNCS 765, pp. 229-248, Springer-Verlag, 1994.
    • (1994) Eurocrypt '93 , pp. 229-248
    • Biham, E.1
  • 5
    • 0031366921 scopus 로고    scopus 로고
    • Comments on theory and application of cellular automata in cryptography
    • S. Blackburn, S. Murphy, and K. Paterson, Comments on theory and application of cellular automata in cryptography, IEEE Transactions on Computers, vol. 46, no. 5, pp. 637-638, 1997.
    • (1997) IEEE Transactions on Computers , vol.46 , Issue.5 , pp. 637-638
    • Blackburn, S.1    Murphy, S.2    Paterson, K.3
  • 6
    • 0003818882 scopus 로고    scopus 로고
    • Additive Cellular Automata: Theory and Applications
    • Wiley-IEEE Computer Society Press
    • P. P. Chaudhuri, D. R. Chowdhury, S. Nandi, and S. Chattopadhyay, Additive Cellular Automata: Theory and Applications, Wiley-IEEE Computer Society Press, Vol. 1, 1997.
    • (1997) , vol.1
    • Chaudhuri, P.P.1    Chowdhury, D.R.2    Nandi, S.3    Chattopadhyay, S.4
  • 7
    • 84896946612 scopus 로고    scopus 로고
    • Free Software Implementation
    • Christophe Devine, Free Software Implementation. (http://www.cs.rochester.edu/brown/Crypto/src/AES.c)
    • Devine, C.1
  • 9
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attacks on block ciphers
    • Springer-Verlag, LNCS, 1267
    • T. Jakobson, and L. Knudsen, The interpolation attacks on block ciphers, FSE-97, LNCS 1267, pp. 28-40, Springer-Verlag, 1997.
    • (1997) FSE-97 , pp. 28-40
    • Jakobson, T.1    Knudsen, L.2
  • 10
    • 67650338267 scopus 로고    scopus 로고
    • Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER and Triple-DES
    • Springer-Verlag, LNCS, 1109
    • J. Kelsey, B. Schneier, and B. Wagner, Key- schedule cryptanalysis of IDEA, G-DES, GOST, SAFER and Triple-DES, Crypto'96, LNCS 1109, pp. 237-251, Springer-Verlag, 1997.
    • (1997) Crypto'96 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, B.3
  • 12
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis
    • Springer-Verlag, LNCS, 1666
    • P. Kocher, J. Jaffre, and B. Jun, Differential power analysis, Crypto'99, LNCS 1666, pp. 398-412, Springer-Verlag, 1999.
    • (1999) Crypto'99 , pp. 398-412
    • Kocher, P.1    Jaffre, J.2    Jun, B.3
  • 13
    • 85028910917 scopus 로고
    • Markov ciphers and differential cryptanalysis
    • Springer-Verlag, LNCS, 576
    • X. Lai, and J. L. Massey, Markov ciphers and differential cryptanalysis, Crypto '91, LNCS 576, pp. 17-38, Springer-Verlag, 1992.
    • (1992) Crypto '91 , pp. 17-38
    • Lai, X.1    Massey, J.L.2
  • 14
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Springer-Verlag, LNCS, 765
    • M. Matsui, Linear cryptanalysis method for DES cipher, Eurocrypt '93, LNCS 765, pp.386-397, Springer-Verlag, 1994.
    • (1994) Eurocrypt '93 , pp. 386-397
    • Matsui, M.1
  • 15
    • 84944878354 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography
    • CRC Press, Oct
    • A. Menezes, P. V. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Oct. 1996
    • (1996)
    • Menezes, A.1    Oorschot, P.V.2    Vanstone, S.3
  • 17
    • 0028750092 scopus 로고
    • Theory and application of cellular automata in cryptography
    • S. Nandi, B. K. Kar, and P. P. Chaudhuri, Theory and application of cellular automata in cryptography, IEEE Transaction on Computers, vol. 43, no. 12, pp. 1346-1357, 1994.
    • (1994) IEEE Transaction on Computers , vol.43 , Issue.12 , pp. 1346-1357
    • Nandi, S.1    Kar, B.K.2    Chaudhuri, P.P.3
  • 18
    • 84944078733 scopus 로고    scopus 로고
    • Cellular automata based cryptosystem (CAC)
    • Springer-Verlag, LNCS, 2513
    • S. Sen, C. Shaw, D. R. Chowdhuri, N. Ganguly, and P. Pal Chaudhuri, Cellular automata based cryptosystem (CAC), ACRI-2002, LNCS 2513, pp. 303-314, Springer-Verlag, 2002.
    • (2002) ACRI-2002 , pp. 303-314
    • Sen, S.1    Shaw, C.2    Chowdhuri, D.R.3    Ganguly, N.4    Pal Chaudhuri, P.5
  • 19
    • 33646836401 scopus 로고    scopus 로고
    • Reversible cellular automata based encryption
    • Springer-Verlag, LNCS, 3222
    • F. Seredynski, K. Pienkosz, and P. Bouvry, Reversible cellular automata based encryption, NPC '04, LNCS 3222, pp. 411-418, Springer-Verlag, 2004.
    • (2004) NPC '04 , pp. 411-418
    • Seredynski, F.1    Pienkosz, K.2    Bouvry, P.3
  • 20
    • 2642563715 scopus 로고    scopus 로고
    • Cellular automata computation and secret key cryptography
    • F. Seredynski, P. Bouvry, and A. Y. Zomaya, Cellular automata computation and secret key cryptography, Parallel Computing, vol. 30, pp. 753-766, 2004.
    • (2004) Parallel Computing , vol.30 , pp. 753-766
    • Seredynski, F.1    Bouvry, P.2    Zomaya, A.Y.3
  • 21
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 22
    • 17444420720 scopus 로고    scopus 로고
    • High speed networking: Design and implementation of two new DDP-based ciphers
    • Springer-Verlag
    • N. Sklavos, N. A. Moldovyan, and O. Koufopavlou, High speed networking: Design and implementation of two new DDP-based ciphers, Mobile Networks and Applications-MONET, vol. 25, no. 1-2, pp. 219-231, Springer-Verlag, 2005.
    • (2005) Mobile Networks and Applications-MONET , vol.25 , Issue.1-2 , pp. 219-231
    • Sklavos, N.1    Moldovyan, N.A.2    Koufopavlou, O.3
  • 23
    • 85086814154 scopus 로고    scopus 로고
    • A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES rijndael
    • California
    • F. Standaert, G. Rouvroy, J. Quisquater and J. Legat, A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES rijndael, FPGA-2003, pp. 281-291, California, 2003.
    • (2003) FPGA-2003 , pp. 281-291
    • Standaert, F.1    Rouvroy, G.2    Quisquater, J.3    Legat, J.4
  • 24
    • 35048901993 scopus 로고    scopus 로고
    • ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware
    • Springer-Verlag, LNCS, 3017
    • F. Standaert, G. Piret, G. Rouvroy, J. Quisquater, and J. Legat, ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware, FSE '04, LNCS 3017, pp. 279-299, Springer-Verlag, 2004.
    • (2004) FSE '04 , pp. 279-299
    • Standaert, F.1    Piret, G.2    Rouvroy, G.3    Quisquater, J.4    Legat, J.5
  • 25
    • 0001566941 scopus 로고    scopus 로고
    • Invertible cellular automat: A review
    • reprinted with correction as of Oct. 2001
    • T. Toffoli, and N. Margolus, Invertible cellular automat: A review, Physica D, vol. 45, pp. 229-253, (reprinted with correction as of Oct. 2001).
    • Physica D , vol.45 , pp. 229-253
    • Toffoli, T.1    Margolus, N.2
  • 26
    • 84994719216 scopus 로고    scopus 로고
    • Cryptosystem for lowpower devices
    • Munich, Germany, Apr
    • S. Tripathy, and S. Nandi, Cryptosystem for low-power devices, Turbocoding-2006, Munich, Germany, Apr. 2006.
    • (2006) Turbocoding-2006
    • Tripathy, S.1    Nandi, S.2
  • 27
    • 84992720189 scopus 로고
    • Cryptography with Cellular Automata
    • Springer-Verlag, LNCS, 218
    • S. Wolfram, Cryptography with Cellular Automata, Crypto '85, LNCS 218, pp. 429-432, Springer-Verlag, 1986.
    • (1986) Crypto '85 , pp. 429-432
    • Wolfram, S.1
  • 28
    • 46149128523 scopus 로고
    • Random sequence generation by cellular automata
    • S. Wolfram, Random sequence generation by cellular automata, Advances in Applied Maths, vol. 7, no. 2, pp. 123-169, 1986.
    • (1986) Advances in Applied Maths , vol.7 , Issue.2 , pp. 123-169
    • Wolfram, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.