Cryptographic properties of Boolean functions defining elementary cellular automata
暂无分享,去创建一个
Ángel Martín del Rey | Araceli Queiruga Dios | Gerardo Rodríguez Sánchez | A. de la Villa Cuenca | J. Escuadra Burrieza | J. L. Pérez Iglesias | G. R. Sánchez | A. Q. Dios | Á. M. D. Rey | A. D. L. V. Cuenca | J. E. Burrieza | J. L. P. Iglesias
[1] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[2] Steven Guan,et al. Evolving cellular automata to generate nonlinear sequences with desirable properties , 2007, Appl. Soft Comput..
[3] Stephen Wolfram,et al. A New Kind of Science , 2003, Artificial Life.
[4] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[5] Willi Meier,et al. Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.
[6] James L. Massey,et al. A spectral characterization of correlation-immune combining functions , 1988, IEEE Trans. Inf. Theory.
[7] Rainer A. Rueppel,et al. Products of linear recurring sequences with maximum complexity , 1987, IEEE Trans. Inf. Theory.
[8] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[9] Amparo Fúster-Sabater,et al. Cellular Automata Application to the Linearization of Stream Cipher Generators , 2004, ACRI.
[10] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[11] Pino Caballero-Gil,et al. On the Use of Cellular Automata in Symmetric Cryptography , 2010, ArXiv.
[13] Marcin Seredynski,et al. Block Encryption Using Reversible Cellular Automata , 2004, ACRI.
[14] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[15] Mitsuru Matsui,et al. On Correlation Between the Order of S-boxes and the Strength of DES , 1994, EUROCRYPT.
[16] Carlisle M. Adams,et al. On Immunity Against Biham and Shamir's "Differential Cryptanalysis" , 1992, Information Processing Letters.
[17] Burton Voorhees,et al. Additive Cellular Automata , 2009, Encyclopedia of Complexity and Systems Science.
[18] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[19] Thomas Siegenthaler,et al. Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.
[20] Santanu Chattopadhyay,et al. Additive cellular automata : theory and applications , 1997 .
[21] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[22] Parimal Pal Chaudhuri,et al. Cellular Automata Based Authentication (CAA) , 2002, ACRI.
[23] Marco Tomassini,et al. Cryptography with cellular automata , 2001, Appl. Soft Comput..
[24] Bruno Martin. A Walsh Exploration of Elementary CA Rules , 2008, J. Cell. Autom..