New Symmetrical Cryptosystems Based on a Dynamic Optimization Model : two-Dimensional non-Uniform Cellular Automata
暂无分享,去创建一个
[1] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[2] Palash Sarkar,et al. A brief history of cellular automata , 2000, CSUR.
[3] Albert Y. Zomaya,et al. Cellular automata computations and secret key cryptography , 2004, Parallel Comput..
[4] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[5] J. H. Lint. Winning ways for your mathematical plays, vol. 1: Games in general; vol. 2: Games in particular / E.R. Berlekamp, J.H. Conway, R.K. Guy , 1985 .
[6] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[9] Franck Leprévost. Les standards cryptographiques du XXI e siècle : AES et IEEE-P1363 , 2000 .
[10] Pino Caballero-Gil,et al. Application of Linear Hybrid Cellular Automata to Stream Ciphers , 2007, EUROCAST.
[11] Herman Akdag,et al. Images encryption by the use of evolutionary algorithms , 2011 .
[12] N. Margolus,et al. Invertible cellular automata: a review , 1991 .
[13] Matthew Cook,et al. Universality in Elementary Cellular Automata , 2004, Complex Syst..
[14] Puhua Guan,et al. Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..
[15] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[16] D. Huffman. A Method for the Construction of Minimum-Redundancy Codes , 1952 .
[17] Jon C. Muzio,et al. Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q) , 1996, IEEE Trans. Computers.
[18] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[19] Julien Provillard. Automates cellulaires non-uniformes , 2012 .
[20] Marco Tomassini,et al. Stream Cyphers with One- and Two-Dimensional Cellular Automata , 2000, PPSN.
[21] Robert H. Gilman. Classes of linear automata , 1987 .
[22] Nicolas Ollinger,et al. Bulking II: Classifications of cellular automata , 2010, Theor. Comput. Sci..
[23] Stanislaw M. Ulam. Patterns of Growth of Figures , 1986 .
[24] Marco Tomassini,et al. On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata , 2000, IEEE Trans. Computers.
[25] Klaus Sutner. Classifying circular cellular automata , 1991 .
[26] A. Anderson,et al. Stability analysis of a hybrid cellular automaton model of cell colony growth. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[27] Marco Tomassini,et al. Cryptography with cellular automata , 2001, Appl. Soft Comput..
[28] Bruno Martin. A Walsh Exploration of Elementary CA Rules , 2008, J. Cell. Autom..
[29] Douglas R. Stinson,et al. Cryptographie - Théorie et Pratique , 1996 .
[30] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[31] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[32] P. Kurka. Languages, equicontinuity and attractors in cellular automata , 1997, Ergodic Theory and Dynamical Systems.
[33] S. Ulam. A collection of mathematical problems , 1960 .
[34] Jarkko Kari. Cryptosystems Based on Reversible Cellular Automata , 1992 .
[35] Howard Gutowitz,et al. Cryptography with Dynamical Systems , 1993 .
[36] Bruno Martin. Analyse des suites aléatoires engendrées par des automates cellulaires et applications à la cryptographie , 2008, ArXiv.
[37] G. Tindo. CCPBAC:un cryptosystème à clés publiques basés sur des automates cellulaires , 2022 .