A cryptosystem based on cellular automata
Digital secure communications systems are based on permutations of binary words that are
selected by following a pseudorandom sequence of choices. The phenomenon of …
selected by following a pseudorandom sequence of choices. The phenomenon of …
Image encryption with an improved cryptosystem based on a matrix approach
MT Ramírez-Torres, JS Murguía… - International Journal of …, 2014 - World Scientific
This paper carries out the image encryption with a revised and modified cryptosystem based
on a rule-90 cellular automaton. For this purpose, we used an appropriate and convenient …
on a rule-90 cellular automaton. For this purpose, we used an appropriate and convenient …
Two-dimensional DFA scaling analysis applied to encrypted images
C Vargas-Olmos, JS Murguía… - … Journal of Modern …, 2015 - World Scientific
The technique of detrended fluctuation analysis (DFA) has been widely used to unveil
scaling properties of many different signals. In this paper, we determine scaling properties in …
scaling properties of many different signals. In this paper, we determine scaling properties in …
Binary chaos synchronization in elementary cellular automata
It is shown that 8 of all 256 elementary cellular automata have the property of chaos
synchronization using a binary driving sequence. The binary synchronization signal ensures …
synchronization using a binary driving sequence. The binary synchronization signal ensures …
Matrix approach of an encryption system based on cellular automata and its numerical implementation
JS Murguía, G FLORES-ERAÑA… - International Journal of …, 2012 - World Scientific
MATRIX APPROACH OF AN ENCRYPTION SYSTEM BASED ON CELLULAR AUTOMATA
AND ITS NUMERICAL IMPLEMENTATION Page 1 MATRIX APPROACH OF AN …
AND ITS NUMERICAL IMPLEMENTATION Page 1 MATRIX APPROACH OF AN …
Synchronization of elementary cellular automata
In this paper, we study how synchronization and state estimation are related in the context of
elementary cellular automata. We first characterize the geometric properties of the …
elementary cellular automata. We first characterize the geometric properties of the …
Design and Implementation of a Configurable Encryption System for Power-Constrained Devices
JDJ De La Rosa-De La, JS Murguía… - IEEE …, 2023 - ieeexplore.ieee.org
In this work, we present a configurable encryption system based on the Encryption by
Synchronization in a Cellular Automata (ESCA) system, which is a symmetric key algorithm …
Synchronization in a Cellular Automata (ESCA) system, which is a symmetric key algorithm …
Cellular automata for the observation of complex systems
T Plenet - 2022 - theses.hal.science
In this thesis, we propose to study the observability of cellular automata (CA), ie how we can
efficiently reconstruct the state of a CA from a limited number of measurements. To do so, we …
efficiently reconstruct the state of a CA from a limited number of measurements. To do so, we …
An asymptotically perfect pseudorandom generator
M Mejía, J Urías - Discrete and Continuous Dynamical Systems, 2000 - aimsciences.org
A transformation of binary sequences that is ergodic and mixing with respect to the
equidistributed measure is constructed with the help of a cellular automaton. The …
equidistributed measure is constructed with the help of a cellular automaton. The …
[PDF][PDF] Image Encryption System Based on Cellular Automata and S-Box.
This investigation presents an image encryption system and its security analysis, it is based
on cellular automata and a substitution box. The joint of these two techniques, allow to …
on cellular automata and a substitution box. The joint of these two techniques, allow to …