Collective Behavior of Rules for Cellular Automata-based Stream Ciphers
暂无分享,去创建一个
[1] Albert Y. Zomaya,et al. Cellular automata computations and secret key cryptography , 2004, Parallel Comput..
[2] Howard Gutowitz,et al. Cryptography with Dynamical Systems , 1993 .
[3] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[4] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[5] Jarkko Kari. Cryptosystems Based on Reversible Cellular Automata , 1992 .
[6] Marco Tomassini,et al. On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.
[7] Puhua Guan,et al. Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1992, Artificial Intelligence.
[10] Marco Tomassini,et al. Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.
[11] Pascal Bouvry,et al. Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers , 2005, KES.
[12] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[13] Zbigniew Michalewicz,et al. Genetic Algorithms + Data Structures = Evolution Programs , 1996, Springer Berlin Heidelberg.