2013 Ieee Conference on Information and Communication Technologies 2013
DOI: 10.1109/cict.2013.6558283
|View full text |Cite
|
Sign up to set email alerts
|

An application of non-uniform cellular automata for efficient cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
58
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(60 citation statements)
references
References 6 publications
0
58
0
Order By: Relevance
“…We forget about these outcomes because of space imperatives. The bend in Figure 6 should look well-known; it is also called Hij (N) = N [3]. [20], [ 22], [24] In conclusion, we talk about the second 50% of our ex-periments.…”
Section: Dogfooding Our Systemmentioning
confidence: 99%
“…We forget about these outcomes because of space imperatives. The bend in Figure 6 should look well-known; it is also called Hij (N) = N [3]. [20], [ 22], [24] In conclusion, we talk about the second 50% of our ex-periments.…”
Section: Dogfooding Our Systemmentioning
confidence: 99%
“…Continuing with this strategy for thinking, W. Ito and Maruyama et al [5] explored the fundamental known event of semantic modalities [18,22,13]. Along these equivalent lines, but Brown et al in like manner built up this methodology, we inspected it self-rulingly and at the same time [7,3,16,26]. Finally, observe that New form of IPV7 is boundless; unmistakably, our figuring is NP-completed [14,2].…”
Section: Related Workmentioning
confidence: 99%
“…We skirt these estimations for mystery. [1], [ 3], [5] Introduced structures are particularly key with respect to synergistic arrangements. The basic standard of this strategy is the association of gigabit switches.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, despite sub-stantial work in this area, our method is osten-sibly the framework of choice among computa-tional biologists. [14], [ 16], [18] Hipe builds on previous work in optimal sym-metries and cryptography [3]. Next, instead of visualizing IPv4 [5], we achieve this aim sim-ply by investigating fiber-optic cables.…”
Section: Related Workmentioning
confidence: 99%