Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Reply to Comments on "Theory and Application of Cellular Automata in Cryptography"
IEEE Transactions on Computers
Cellular Automata Based Cryptosystem (CAC)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem
IEEE Transactions on Computers
Image security system using recursive cellular automata substitution
Pattern Recognition
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme
Computational Intelligence and Security
Theory of Composing Non-linear Machines with Predictable Cyclic Structures
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Cryptanalysis of a new cellular automata cryptosystem
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Garden of eden configurations for 2-D cellular automata with rule 2460N
Information Sciences: an International Journal
d-monomial tests of nonlinear cellular automata for cryptographic design
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Structure and reversibility of 2D hexagonal cellular automata
Computers & Mathematics with Applications
Cellular automata: an ideal candidate for a block cipher
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Hi-index | 14.99 |
The cipher systems based on Cellular Automata proposed by Nandi et al. [3] are affine and are insecure.