Group Properties of Cellular Automata and VLSI Applications
IEEE Transactions on Computers
Cryptography with cellular automata
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Codes and cryptography
Cryptography: an introduction to computer security
Cryptography: an introduction to computer security
Permutation generators of alternating groups
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Public-key cryptography
Correlation properties of combiners with memory in stream ciphers (extended abstract)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Cryptography and data security
Cryptography and data security
Design of CAECC - Cellular Automata Based Error Correcting Code
IEEE Transactions on Computers
Analysis of Periodic and Intermediate Boundary 90/150 Cellular Automata
IEEE Transactions on Computers
CAA Decoder for Cellular Automata Based Byte Error Correcting Code
IEEE Transactions on Computers
A brief history of cellular automata
ACM Computing Surveys (CSUR)
On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Automata
IEEE Transactions on Computers
Cellular Automata-Based Recursive Pseudoexhaustive Test Pattern Generator
IEEE Transactions on Computers
IEEE Transactions on Computers
Comments on "Theory and Applications of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Reply to Comments on "Theory and Application of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Stream Cyphers with One- and Two-Dimensional Cellular Automata
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
Cellular Automata Based Cryptosystem (CAC)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A VLSI architecture for cellular automata based parallel data compression
VLSID '96 Proceedings of the 9th International Conference on VLSI Design: VLSI in Mobile Communication
Design and study of a strong crypto-system model for e-Commerce
ICCC '02 Proceedings of the 15th international conference on Computer communication
Pseudorandom number generation based on controllable cellular automata
Future Generation Computer Systems - Special issue: Advanced services for clusters and internet computing
Cellular automata computations and secret key cryptography
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem
IEEE Transactions on Computers
Image security system using recursive cellular automata substitution
Pattern Recognition
Analysis of complemented CA derived from linear hybrid group CA
Computers & Mathematics with Applications
A DSP based pod implementation for high speed multimedia communications
EURASIP Journal on Applied Signal Processing
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Analysis of 90/150 Two Predecessor Nongroup Cellular Automata
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Analysis of Linear Group GF(2p) Cellular Automata
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Theory of Composing Non-linear Machines with Predictable Cyclic Structures
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Pseudo-random sequence generators based on cellular automata and bent functions
WSEAS Transactions on Computer Research
Randomness quality of permuted pseudorandom binary sequences
Mathematics and Computers in Simulation
Exploring Cycle Structures of Additive Cellular Automata
Fundamenta Informaticae - Membrane Computing
Message Authentication Protocol Based on Cellular Automata
Proceedings of the 2007 EvoWorkshops 2007 on EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog: Applications of Evolutionary Computing
A high-quality pseudorandom numbers generator based on twi-layer couple cellular automata
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Logic programming for combinatorial problems
Artificial Intelligence Review
Abstract compositional analysis of iterated relations: a structural approach to complex state transition systems
Cellular programming and symmetric key cryptography systems
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
Cryptanalysis of a new cellular automata cryptosystem
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Secret key specification for a variable-length cryptographic cellular automata model
PPSN'10 Proceedings of the 11th international conference on Parallel problem solving from nature: Part II
Weakness analysis of a key stream generator based on cellular automata
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Encryption based on reversible second-order cellular automata
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Cryptanalysis of a cellular automata cryptosystem
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Cellular automata: an ideal candidate for a block cipher
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Analysis of hybrid group cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Behaviors of single attractor cellular automata over galois field GF(2p)
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A protocol to provide assurance of images integrity using memory cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Weak key analysis and micro-controller implementation of CA stream ciphers
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Practical attack on the shrinking generator
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I
Cryptography with asynchronous logic automata
Cryptography and Security
Behavior of complemented CA whose complement vector is acyclic in a linear TPMACA
Mathematical and Computer Modelling: An International Journal
Chaotic encryption method based on life-like cellular automata
Expert Systems with Applications: An International Journal
Exploring Cycle Structures of Additive Cellular Automata
Fundamenta Informaticae - Membrane Computing
On the combination of self-organized systems to generate pseudo-random numbers
Information Sciences: an International Journal
Utilization of Pipeline Technique in AOP Based Multipliers with Parallel Inputs
Journal of Signal Processing Systems
Hi-index | 15.01 |
This paper deals with the theory and application of Cellular Automata (CA) for a class of block ciphers and stream ciphers. Based on CA state transitions certain fundamental transformations are defined which are block ciphering functions of the proposed enciphering scheme, These fundamental transformations are found to generate the simple (alternating) group of even permutations which in turn is a subgroup of the permutation group, These functions are implemented with a class of programmable cellular automata (PCA) built around rules 51, 153, and 195. Further, high quality pseudorandom pattern generators built around rule 90 and 150 programmable cellular automata with a rule selector (i.e., combining function) has been proposed as running key generators in stream ciphers, Both the schemes provide better security against different types of attacks. With a simple, regular, modular and cascadable structure of CA, hardware implementation of such schemes idealy suit VLSI implementation.