Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Stream Cyphers with One- and Two-Dimensional Cellular Automata
PPSN VI Proceedings of the 6th International Conference on Parallel Problem Solving from Nature
Cellular Automata Based Cryptosystem (CAC)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A Complexity-Theoretic Approach to the Design of Good Measures of Cryptographic Strength
Computer Aided Systems Theory - EUROCAST 2001-Revised Papers
Cellular Automata Based Authentication (CAA)
ACRI '01 Proceedings of the 5th International Conference on Cellular Automata for Research and Industry
Cryptosystem Designed for Embedded System Security
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Encryption using two-dimensional cellular automata with applications
Artificial intelligence and security in computing systems
Pseudorandom number generation based on controllable cellular automata
Future Generation Computer Systems - Special issue: Advanced services for clusters and internet computing
Cellular automata computations and secret key cryptography
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Cryptographically Strong S-Boxes Based on Cellular Automata
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
ICIC '08 Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Pseudo-random sequence generators based on cellular automata and bent functions
WSEAS Transactions on Computer Research
Cellular automata-based authentication for low-cost RFID systems
International Journal of Communication Networks and Distributed Systems
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Implementing a Margolus Neighborhood Cellular Automata on a FPGA
IWANN '03 Proceedings of the 7th International Work-Conference on Artificial and Natural Neural Networks: Part II: Artificial Neural Nets Problem Solving Methods
Message Authentication Protocol Based on Cellular Automata
Proceedings of the 2007 EvoWorkshops 2007 on EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog: Applications of Evolutionary Computing
Cellular Automata-Based S-Boxes vs. DES S-Boxes
PaCT '09 Proceedings of the 10th International Conference on Parallel Computing Technologies
Designing cryptographically strong S-boxes with the use of cellular automata
Annales UMCS, Informatica
Analysis of pseudo random sequences generated by cellular automata
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Cellular programming and symmetric key cryptography systems
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
Cryptanalysis of a new cellular automata cryptosystem
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Secret key specification for a variable-length cryptographic cellular automata model
PPSN'10 Proceedings of the 11th international conference on Parallel problem solving from nature: Part II
Weakness analysis of a key stream generator based on cellular automata
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part II
Generating cryptographically suitable non-linear maximum length cellular automata
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Chaotic cellular automata with cryptographic application
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
d-monomial tests of nonlinear cellular automata for cryptographic design
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Generating pseudo-random sequences from cellular automata and bent functions
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
A tool for implementing and exploring SBM models: universal 1D invertible cellular automata
IWINAC'05 Proceedings of the First international conference on Mechanisms, Symbols, and Models Underlying Cognition: interplay between natural and artificial computation - Volume Part I
Encryption based on reversible second-order cellular automata
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Cryptanalysis of a cellular automata cryptosystem
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Modelling of complex cryptographic systems in terms of simple cellular automata
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
A critique of some chaotic-map and cellular automata-based stream ciphers
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
A cellular automata calculation model based on ternary optical computers
HPCA'09 Proceedings of the Second international conference on High Performance Computing and Applications
A new pseudo-random generator based on gollmann cascades of baker-register-machines
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Discrete physics, cellular automata and cryptography
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A protocol to provide assurance of images integrity using memory cellular automata
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
Weak key analysis and micro-controller implementation of CA stream ciphers
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Practical attack on the shrinking generator
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Cryptography with asynchronous logic automata
Cryptography and Security
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
CAR30: A new scalable stream cipher with rule 30
Cryptography and Communications
An evolvable cellular automata based data encryption algorithm
International Journal of Wireless and Mobile Computing
Natural Computing: an international journal
Hi-index | 0.00 |