International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Walsh transform in order to find out correlation-immune rules for generating good pseudo-random sequences. We prove that, except the 8 linear rules, there is no correlation-immune rule among the 256 rules. Thus, Wolfram cellular automata cannot be used as a cryptographic pseudo-random generator since the generated pseudo-random sequences are susceptible of correlation attacks. We conclude with some remarks on cryptography with cellular automata
Abstract- The paper presents new results concerning application of cellular automata (CAs) to the se...
In this paper we consider a problem of generation by cellular automata of high qualitypseudorandom s...
The cryptography is known as one of most essential ways for protecting information against threats. ...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceGeneration of pseudo random sequences by cellular automata, as well as by hybr...
15 pagesInternational audienceGeneration of pseudo-random binary sequences by one-dimensional cellul...
This paper presents a new approach to designing pseudorandom number generators based on cellular aut...
Cryptographic schemes using one-dimensional, three-neighbor cellular automata as a primitive have be...
"In this paper, we implement a revised pseudo random bit generator based on a rule-90 cellular autom...
A novel Cellular Automata (CA) Controllable CA (CCA) is proposed in this paper. Further, CCA are ap...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
2noCellular Automata (CA) have a long history being employed as pseudo-random number generators (PRN...
International audienceWe introduce the notion of asynchrony immunity for cellular automata (CA), whi...
3siWe continue the study of asynchrony immunity in cellular automata (CA), which can be considered a...
Abstract- The paper presents new results concerning application of cellular automata (CAs) to the se...
In this paper we consider a problem of generation by cellular automata of high qualitypseudorandom s...
The cryptography is known as one of most essential ways for protecting information against threats. ...
International audienceIn this paper, we explore the 256 elementary cellular automata rules by a Wals...
International audienceGeneration of pseudo random sequences by cellular automata, as well as by hybr...
15 pagesInternational audienceGeneration of pseudo-random binary sequences by one-dimensional cellul...
This paper presents a new approach to designing pseudorandom number generators based on cellular aut...
Cryptographic schemes using one-dimensional, three-neighbor cellular automata as a primitive have be...
"In this paper, we implement a revised pseudo random bit generator based on a rule-90 cellular autom...
A novel Cellular Automata (CA) Controllable CA (CCA) is proposed in this paper. Further, CCA are ap...
International audienceThe study of cellular automata rules suitable for cryptographic applications i...
The cryptographic use of Wolfram cellular automata as pseudorandom bit generators and their properti...
2noCellular Automata (CA) have a long history being employed as pseudo-random number generators (PRN...
International audienceWe introduce the notion of asynchrony immunity for cellular automata (CA), whi...
3siWe continue the study of asynchrony immunity in cellular automata (CA), which can be considered a...
Abstract- The paper presents new results concerning application of cellular automata (CAs) to the se...
In this paper we consider a problem of generation by cellular automata of high qualitypseudorandom s...
The cryptography is known as one of most essential ways for protecting information against threats. ...