Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata
暂无分享,去创建一个
[1] Joan Daemen,et al. Cipher and hash function design strategies based on linear and differential cryptanalysis , 1995 .
[2] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[3] Leon O. Chua,et al. Efficient implementation of neighborhood logic for cellular automata via the Cellular Neural Network Universal Machine , 1997 .
[4] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[5] Joos Vandewalle,et al. High speed calculation of cryptographic hash functions by CNN chips , 1998, 1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359).
[6] Joos Vandewalle,et al. Invertible operations on a Cellular Neural Network Universal Machine , 1998 .