Sciweavers

7 search results - page 1 / 2
» Secret Key Cryptography with Cellular Automata
Sort
View
IPPS
2003
IEEE
13 years 10 months ago
Secret Key Cryptography with Cellular Automata
The paper presents new results concerning application of cellular automata (CAs) to the secret key cryptography
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
13 years 10 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
LATA
2009
Springer
13 years 11 months ago
A Cryptosystem Based on the Composition of Reversible Cellular Automata
We present conditions which guarantee that a composition of marker cellular automata has the same neighbourhood as each of the individual components. We show that, under certain te...
Adam Clarridge, Kai Salomaa
FC
2005
Springer
109views Cryptology» more  FC 2005»
13 years 10 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
ASIACRYPT
2005
Springer
13 years 10 months ago
A Near-Practical Attack Against B Mode of HBB
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
Joydip Mitra