Cryptography using Automata Theory

K Vayadande, K Agarwal, A Kabra… - ITM Web of …, 2022 - itm-conferences.org
… drawbacks of popular finite automata-based cryptosystems … cryptography is that, as we all
know, a secret key is used to both … In public key cryptography, each user must produce a pair of …

[图书][B] Finite automata and application to cryptography

R Tao - 2008 - Springer
Automata theory is a mathematical theory to investigate behavior, … automata theory goes
back to AM Turing in 1936 for the formulation of the informal idea of algorithms. Finite automata

Theory and applications of cellular automata in cryptography

S Nandi, BK Kar, PP Chaudhuri - IEEE Transactions on …, 1994 - ieeexplore.ieee.org
cryptography was mentioned by Wolfram [26] with nonlinear CA rule. In the present paper,
we establish the theoryCryptography is an essential requirement for communication privacy …

Cryptography with cellular automata

S Wolfram - Advances in Cryptology—CRYPTO'85 Proceedings 5, 1986 - Springer
Extended Abstract This abstract discusses a stream cipher based on a simple one-dimensional
cellular automation. The cellular automaton consists of a circular register with N cells, …

[PDF][PDF] A Review Paper on Cryptography Using Automata Theory

A Kabra, K Gangwal, A Kinage, K Agarwal - 2022 - easychair.org
… research papers on the topic ‘Cryptography using Automata Theory’. After reviewing these
… the research papers used cellular automata for cryptography but by using finite automata the …

[PDF][PDF] Cryptography Based on Finite Automata–a Brief Overview

B Ristevski, V Manevska - … CONFERENCE ON APPLICATION …, 2013 - eprints.uklo.edu.mk
… application of automata theory to cryptography are briefly surveyed. The automata theory is
… Some of them are based on finite automata, whereas others are based on cellular automata

Development of Reliable and Effective Methods of Cryptographic Protection of Information Based on the Finite Automata Theory

A Sharıpbay, Z Saukhanova, G Shakhmetova… - … Eurasia Proceedings of …, 2023 - epstem.net
… All knowledge about FAC is presented with help of ontology, which is built for first time and
provides clear understanding of using FA in cryptography and systematizes the information …

Cryptography with dynamical systems

H Gutowitz - Cellular Automata and Cooperative Systems, 1993 - Springer
… What we will need to extract from the cryptographic literature for use here is only some
general sense of the methods used by cryptanalysts to study and potentially break cryptographic …

Cryptography with cellular automata

M Tomassini, M Perrenoud - Applied Soft Computing, 2001 - Elsevier
Cryptography has become a basic requirement in this age of global electronic connectivity …
key crypto-graphic system based on one- and two-dimensional non-uniform cellular automata

Cryptographic Security through Kleene's Theorem and Automata Theory

MW Nkongolo - Cryptology ePrint Archive, 2024 - eprint.iacr.org
cryptographic security measures in the face of evolving cyber threats. The aim is to apply
Kleene’s Theorem and automata theory to … mapping them onto finite automata provides a solid …