International audienceWe introduce the notion of asynchrony immunity for cellular automata (CA), which can be considered as a generalization of correlation immunity in the case of boolean functions. The property could have applications in cryptography, namely as a countermeasure for side-channel attacks in CA-based cryptographic primitives. We give some preliminary results about asynchrony immunity, and we perform an exhaustive search of (3, 10)–asynchrony immune CA rules of neighborhood size 3 and 4. We finally observe that all discovered asynchrony-immune rules are center-permutive, and we conjecture that this holds for any size of the neighborhood
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. ...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...
We continue the study of asynchrony immunity in cellular automata (CA), which can be considered as a...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
2noCellular Automata (CA) have a long history being employed as pseudo-random number generators (PRN...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceMost of the works concerning cryptographic applications of cellular automata (...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
Abstract We consider 1D cellular automata (CA) and apply genetic algorithm (GA) to discover subsets...
International audienceCellular Automata (CA) are a computational model widely used in many scientifi...
Abstract. Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cry...
Version : Feb 13th, 2004, submitted to Complex Systems.Cellular Automata (CA) are a class of discret...
4siCellular Automata (CA) are a computational model widely used in many scientific fields. A CA cons...
We present an analysis of an additive cellular automaton (CA) under asynchronous dynamics. The async...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. ...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...
We continue the study of asynchrony immunity in cellular automata (CA), which can be considered as a...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
2noCellular Automata (CA) have a long history being employed as pseudo-random number generators (PRN...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceMost of the works concerning cryptographic applications of cellular automata (...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
Abstract We consider 1D cellular automata (CA) and apply genetic algorithm (GA) to discover subsets...
International audienceCellular Automata (CA) are a computational model widely used in many scientifi...
Abstract. Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as suitable cry...
Version : Feb 13th, 2004, submitted to Complex Systems.Cellular Automata (CA) are a class of discret...
4siCellular Automata (CA) are a computational model widely used in many scientific fields. A CA cons...
We present an analysis of an additive cellular automaton (CA) under asynchronous dynamics. The async...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. ...
This paper proposes a semantically secure construction of pseudo-random permutations using second-or...