Graph cellular automata with relation-based neighbourhoods of cells for complex systems modelling: A case of traffic simulation
K Małecki - Symmetry, 2017 - mdpi.com
A complex system is a set of mutually interacting elements for which it is possible to
construct a mathematical model. This article focuses on the cellular automata theory and the …
construct a mathematical model. This article focuses on the cellular automata theory and the …
[PDF][PDF] Cryptographic Properties of Bipermutive Cellular Automata Rules.
A Leporati, L Mariot - J. Cell. Autom., 2014 - lucamariot.org
Bipermutive rules are known to induce both expansive and mixing chaotic cellular automata.
In this paper, we study some cryptographic properties of bipermutive rules, initially proving …
In this paper, we study some cryptographic properties of bipermutive rules, initially proving …
Insights gained after a decade of cellular automata-based cryptography
L Mariot - International Workshop on Cellular Automata and …, 2024 - Springer
Cellular Automata (CA) have been extensively used to implement symmetric cryptographic
primitives, such as pseudorandom number generators and S-boxes. However, most of the …
primitives, such as pseudorandom number generators and S-boxes. However, most of the …
Hip to be (Latin) square: maximal period sequences from orthogonal cellular automata
L Mariot - 2021 Ninth International Symposium on Computing …, 2021 - ieeexplore.ieee.org
Orthogonal Cellular Automata (OCA) have been recently investigated in the literature as a
new approach to construct orthogonal Latin squares for cryptographic applications such as …
new approach to construct orthogonal Latin squares for cryptographic applications such as …
[PDF][PDF] CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-TimeMultimedia Transmission.
OS Younes, A Alharbi, A Yasseen… - … Systems Science & …, 2023 - cdn.techscience.cn
Due to their significant correlation and redundancy, conventional block cipher cryptosystems
are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata …
are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata …
Enumerating orthogonal latin squares generated by bipermutive cellular automata
We consider the problem of enumerating pairs of bipermutive cellular automata (CA) which
generate orthogonal Latin squares. Since the problem has already been settled for …
generate orthogonal Latin squares. Since the problem has already been settled for …
Cellular automata pseudo-random number generators and their resistance to asynchrony
Cellular Automata (CA) have a long history being employed as pseudo-random number
generators (PRNG), especially for cryptographic applications such as keystream generation …
generators (PRNG), especially for cryptographic applications such as keystream generation …
Xiao-Massey 定理: 历史背景, 学术影响和原创性
张卫国 - Journal of Cryptologic Research, 2022 - search.proquest.com
Abstract 1985 年, 肖国镇在第23 届ISIT 国际会议上提出非线性组合函数的" 线性统计独立"
的概念, 用频谱方法刻画了线性统计独立函数的特征. 线性统计独立与同一时期Siegenthaler …
的概念, 用频谱方法刻画了线性统计独立函数的特征. 线性统计独立与同一时期Siegenthaler …
Achieving better security using nonlinear cellular automata as a cryptographic primitive
S Maiti, D Roy Chowdhury - … , ICMC 2018, Varanasi, India, January 9-11 …, 2018 - Springer
Nonlinear functions are essential in different crypto-primitives as they play an important role
on the security of a cipher design. Wolfram identified Rule 30 as a powerful nonlinear …
on the security of a cipher design. Wolfram identified Rule 30 as a powerful nonlinear …
Investigating four neighbourhood cellular automata as better cryptographic primitives
J Jose, DR Chowdhury - Journal of Discrete Mathematical …, 2017 - Taylor & Francis
Abstract Three-neighbourhood Cellular Automata (CA) are widely studied and accepted as
suitable cryptographic primitive. Rule 30, a 3-neighbourhood nonlinear CA rule, was …
suitable cryptographic primitive. Rule 30, a 3-neighbourhood nonlinear CA rule, was …