2noCellular Automata (CA) have a long history being employed as pseudo-random number generators (PRNG), especially for cryptographic applications such as keystream generation in stream ciphers. Initially starting from the study of rule 30 of elementary CA, multiple rules where the objects of investigation and were shown to be able to pass most of the rigorous statistical tests used to assess the quality of PRNG. In all cases, the CA employed where of the classical, synchronous kind. This assumes a global clock regulating all CA updates which can be a weakness if an attacker is able to tamper it. Here we study how much asynchrony is necessary to make a CA-based PRNG ineffective. We have found that elementary CA are subdivided into three clas...
3siWe continue the study of asynchrony immunity in cellular automata (CA), which can be considered a...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...
A novel Cellular Automata (CA) Controllable CA (CCA) is proposed in this paper. Further, CCA are ap...
To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. ...
This paper presents a new approach to designing pseudorandom number generators based on cellular aut...
Nowadays, the practice of developing algorithms to maintain the confidentiality of data shows that t...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
In this paper, we study the effect of dynamic permutation and sampling on the randomness quality of ...
AbstractA 1-dimensional cellular automaton which generates random sequences is discussed. Each site ...
In this article, a new Pseudorandom Number Generator (PRNG) construction is proposed. It is based on...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceWe introduce the notion of asynchrony immunity for cellular automata (CA), whi...
Cryptographic schemes using one-dimensional, three-neighbor cellular automata as a primitive have be...
"In this paper, we implement a revised pseudo random bit generator based on a rule-90 cellular autom...
3siWe continue the study of asynchrony immunity in cellular automata (CA), which can be considered a...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...
A novel Cellular Automata (CA) Controllable CA (CCA) is proposed in this paper. Further, CCA are ap...
To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. ...
This paper presents a new approach to designing pseudorandom number generators based on cellular aut...
Nowadays, the practice of developing algorithms to maintain the confidentiality of data shows that t...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
In this paper, we study the effect of dynamic permutation and sampling on the randomness quality of ...
AbstractA 1-dimensional cellular automaton which generates random sequences is discussed. Each site ...
In this article, a new Pseudorandom Number Generator (PRNG) construction is proposed. It is based on...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceWe introduce the notion of asynchrony immunity for cellular automata (CA), whi...
Cryptographic schemes using one-dimensional, three-neighbor cellular automata as a primitive have be...
"In this paper, we implement a revised pseudo random bit generator based on a rule-90 cellular autom...
3siWe continue the study of asynchrony immunity in cellular automata (CA), which can be considered a...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...
Cellular automata are used as models of emergent computation and artificial life. They are usually s...