Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Parallel Random Number Generation for VLSI Systems Using Cellular Automata
IEEE Transactions on Computers
Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata
IEEE Transactions on Computers
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Stream Cyphers with One- and Two-Dimensional Cellular Automata
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
Cellular automata computations and secret key cryptography
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
A secret key cryptosystem by iterating a chaotic map
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the experiments related to its implementation on micro-controllers.