2008
DOI: 10.1007/978-3-540-85984-0_22
|View full text |Cite
|
Sign up to set email alerts
|

A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
3

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
2
0
3
Order By: Relevance
“…Cryptography based on CA gave first signals at [5], [10], [11] and recently dealing in [12], [13], it was also included CA as pseudo-random number generator in [14], [15], [16], [17], [18], [19]. Although the inclusion of CA in the field of cryptography is not new, this proposal follows a chaotic sensitivity throughout the process, and our results exceed expectations compared to others found in literature.…”
Section: Introductionmentioning
confidence: 53%
“…Cryptography based on CA gave first signals at [5], [10], [11] and recently dealing in [12], [13], it was also included CA as pseudo-random number generator in [14], [15], [16], [17], [18], [19]. Although the inclusion of CA in the field of cryptography is not new, this proposal follows a chaotic sensitivity throughout the process, and our results exceed expectations compared to others found in literature.…”
Section: Introductionmentioning
confidence: 53%
“…Afterwards, people tried to improve the quality of CA's random generator by using a combination of controllable cells [63], increasing the dimensionality of Cellular Automata [64]- [66], changing the neighborhood of cells [67], using Cellular Automata with additive rules [68], applying the evolutionary principles for designing Cellular Automata [69] and focusing on the parallelism associated with the evolution of global state in Cellular Automata for generating randomness [70].…”
Section: mentioning
confidence: 99%
“…Em 1985, Wolfram (12) introduziu o primeiro arcabouço de criptografia baseado em AC caótico que atualmente tem recebido crescente interesse (14)(15)(16)(17)(18)(19)(20)(21)(22). Muitas das propriedades do caos estão relacionadas com as propriedades criptográficas, as quais são apontadas como requisitos para garantir uma encriptação adequada (25,29).…”
Section: Justificativa E Motivaçãounclassified
“…Na Tabela 5.1.2 é mostrada a comparação entre os resultados obtidos para ρ = 10 blocos e outros algoritmos encontrados na literatura (15)(16)(17)22 …”
Section: Comparação Com Outros Algoritmosunclassified
See 1 more Smart Citation