Random sequence generation by cellular automata
Advances in Applied Mathematics
Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Theory and application of non-group cellular automata for message authentication
Journal of Systems Architecture: the EUROMICRO Journal
A new kind of science
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cellular Automata Based Authentication (CAA)
ACRI '01 Proceedings of the 5th International Conference on Cellular Automata for Research and Industry
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem
IEEE Transactions on Computers
Secret image sharing with steganography and authentication
Journal of Systems and Software
Design of a Cryptosystem Based on Reversible Memory Cellular Automata
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
Tessellations with local transformations
Journal of Computer and System Sciences
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I
Hi-index | 0.00 |
In this work, the use of memory cellular automata to design a cryptographic protocol to provide assurance of digital images integrity is studied It is shown that the proposed protocol is secure against the adequate cryptanalytic attacks As a consequence, memory cellular automata seems to be suitable candidates to the design of hash functions.