Cellular automata machines: a new environment for modeling
Cellular automata machines: a new environment for modeling
Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A design principle for hash functions
CRYPTO '89 Proceedings on Advances in cryptology
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Theory and application of non-group cellular automata for message authentication
Journal of Systems Architecture: the EUROMICRO Journal
A new kind of science
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cellular Automata Based Authentication (CAA)
ACRI '01 Proceedings of the 5th International Conference on Cellular Automata for Research and Industry
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem
IEEE Transactions on Computers
Theory of Self-Reproducing Automata
Theory of Self-Reproducing Automata
Hi-index | 0.00 |
The main goal of this work is to study the design of message authentication protocols by using cellular automata. Specifically, memory cellular automata with linear transition functions are considered. It is shown that the proposed protocol is secure against different cryptanalytic attacks.