Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
暂无分享,去创建一个
[1] Jonathan Katzand,et al. Parallel and Concurrent Security of the HB and HB + Protocols , 2006 .
[2] Vitaly Feldman,et al. New Results for Learning Noisy Parities and Halfspaces , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[3] Puhua Guan,et al. Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..
[4] Howard Gutowitz,et al. Cryptography with Dynamical Systems , 1993 .
[5] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[6] Yoshihide Igarashi,et al. A Randomized Algorithm to Finite Automata Public Key Cryptosystem , 1994, ISAAC.
[7] E. Berlekamp,et al. Winning Ways for Your Mathematical Plays , 1983 .
[8] Hugo Krawczyk,et al. On the existence of pseudorandom generators , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[9] Brenda S. Baker,et al. Approximation algorithms for NP-complete problems on planar graphs , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Moshe Sipper,et al. Non-uniform cellular automata: Evolution in rule space and formation of complex structures , 1994 .
[12] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[13] Renji Tao,et al. Two varieties of finite automaton public key cryptosystem and digital signatures , 2008, Journal of Computer Science and Technology.
[14] Oded Goldreich,et al. Candidate One-Way Functions Based on Expander Graphs , 2000, Studies in Complexity and Cryptography.
[15] ApplebaumBenny,et al. Cryptography in $NC^0$ , 2006 .
[16] Yannick Seurin,et al. How to Encrypt with the LPN Problem , 2008, ICALP.
[17] E. F. Moore. Sequential Machines: Selected Papers , 1964 .
[18] Ding-Zhu Du,et al. Proceedings of the 5th International Symposium on Algorithms and Computation , 1994 .
[19] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[20] Cryptography with constant input locality , 2007, CRYPTO 2007.
[21] Ronitt Rubinfeld,et al. On the learnability of discrete distributions , 1994, STOC '94.
[22] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[23] Jeffrey D. Ullman,et al. Proceedings of the third annual ACM symposium on Theory of computing , 1971 .
[24] Amir Shpilka,et al. On ε-Biased Generators in NC , 2003 .
[25] G. Y. Vichniac,et al. Annealed and quenched inhomogeneous cellular automata (INCA) , 1986 .
[26] J. Davenport. Editor , 1960 .
[27] Yehuda Lindell. Introduction to Coding Theory Lecture Notes , 2009 .
[28] Neil Immerman,et al. On Uniformity within NC¹ , 1990, J. Comput. Syst. Sci..
[29] Bennett,et al. Role of irreversibility in stabilizing complex and nonergodic behavior in locally interacting discrete systems. , 1985, Physical Review Letters.
[30] Stephen Wolfram,et al. Universality and complexity in cellular automata , 1983 .
[31] Bernard Chazelle,et al. Census functions: An approach to VLSI upper bounds , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[32] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[33] Yuval Ishai,et al. Randomizing polynomials: A new representation with applications to round-efficient secure computation , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[34] Franco P. Preparata,et al. Horizons of Parallel Computation , 1992, J. Parallel Distributed Comput..
[35] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[36] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[37] Yuval Ishai,et al. On Pseudorandom Generators with Linear Stretch in NC0 , 2006, APPROX-RANDOM.
[38] Yuval Ishai,et al. Cryptography in NC0 , 2004, SIAM J. Comput..
[39] Oscar Moreno,et al. McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes , 1996, Des. Codes Cryptogr..
[40] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[41] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[42] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[43] F. Thomas Leighton,et al. Complexity Issues in VLSI , 1983 .
[44] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.
[45] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[46] J. Schwartz,et al. Theory of Self-Reproducing Automata , 1967 .
[47] Elchanan Mossel,et al. On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.
[48] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[49] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[50] Yuval Ishai,et al. Computationally Private Randomizing Polynomials and Their Applications , 2005, Computational Complexity Conference.
[51] Shang-Hua Teng. Functional Inversion and Communication Complexity , 1991, CRYPTO.
[52] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[53] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[54] Jarkko Kari. Cryptosystems Based on Reversible Cellular Automata , 1992 .
[55] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[56] Robert E. Tarjan,et al. Applications of a planar separator theorem , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[57] Vadim Lyubashevsky,et al. The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem , 2005, APPROX-RANDOM.
[58] Michael Kearns,et al. Efficient noise-tolerant learning from statistical queries , 1993, STOC.
[59] Heribert Vollmer,et al. Introduction to Circuit Complexity: A Uniform Approach , 2010 .
[60] P. P. Chaudhuri,et al. A Survey on Cellular Automata ∗ , 2003 .
[61] G. Vichniac. Simulating physics with cellular automata , 1984 .
[62] Noam Nisan,et al. Constant depth circuits, Fourier transform, and learnability , 1993, JACM.