Abstract. Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic primitive. Rule 30, a 3-neighbourhood CA rule, was proposed as an ideal candidate for cryp-tographic primitive by Wolfram. However, rule 30 was shown to be weak against Meier-Staffelbach attack [7]. The cryptographic properties like diffusion and randomness increase with increase in neighbourhood radius and thus opens the avenue of exploring the cryptographic properties of 4-neighbourhood CA. This work explores whether four-neighbourhood CA can be a better cryptographic primitive. We construct a class of crypto-graphically suitable 4-neighbourhood nonlinear CA rules that resembles rule 30. One 4-neighbourhood nonlinear CA from this...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
In this thesis paper, we survey the literature arising from Stephan Wolfram\u27s original paper, “Cr...
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of pre...
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic...
Abstract—This article defines a new algorithm for a secret key cryptosystem using cellular automata ...
Abstract- The paper presents new results concerning application of cellular automata (CAs) to the se...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
Abstract We consider 1D cellular automata (CA) and apply genetic algorithm (GA) to discover subsets...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
Abstract--Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D...
AbstractThis paper presents a secure threshold cryptography scheme, referred here as CellTCS, design...
A new cryptographic method based on cellular automata (CA) has been investigated. In this method, th...
Abstract—In this paper we present a new encryption and decryption algorithm for block cipher based o...
Cellular automata (CA) are an interesting computation medium to study because of their simplicity an...
A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which ac...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
In this thesis paper, we survey the literature arising from Stephan Wolfram\u27s original paper, “Cr...
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of pre...
Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cryptographic...
Abstract—This article defines a new algorithm for a secret key cryptosystem using cellular automata ...
Abstract- The paper presents new results concerning application of cellular automata (CAs) to the se...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
Abstract We consider 1D cellular automata (CA) and apply genetic algorithm (GA) to discover subsets...
In cryptography, the previous research generally appears ambiguous and complex to the novice researc...
Abstract--Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D...
AbstractThis paper presents a secure threshold cryptography scheme, referred here as CellTCS, design...
A new cryptographic method based on cellular automata (CA) has been investigated. In this method, th...
Abstract—In this paper we present a new encryption and decryption algorithm for block cipher based o...
Cellular automata (CA) are an interesting computation medium to study because of their simplicity an...
A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which ac...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
In this thesis paper, we survey the literature arising from Stephan Wolfram\u27s original paper, “Cr...
Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of pre...