Proceedings of the 5th International Conference on Engineering and MIS 2019
DOI: 10.1145/3330431.3330452
|View full text |Cite
|
Sign up to set email alerts
|

Application of finite automata in cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In the paper [2], proposed by Kearns Michael and Valiant Leslie in the year 1994, the paper showed how a constant depth threshold circuit, DFA, has significant cryptographic and number theory implications. Application of finite automata in cryptography [3], by A.A.Sharipbay, Zh.S.Saukhanova, G.B.Shayakhmetova and N.S.Saukhanov explain key ideas in symmetric and asymmetric cryptosystems.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In the paper [2], proposed by Kearns Michael and Valiant Leslie in the year 1994, the paper showed how a constant depth threshold circuit, DFA, has significant cryptographic and number theory implications. Application of finite automata in cryptography [3], by A.A.Sharipbay, Zh.S.Saukhanova, G.B.Shayakhmetova and N.S.Saukhanov explain key ideas in symmetric and asymmetric cryptosystems.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the opposite direction of encryption, decryption is the process of transforming encrypted text into plain text. [1,2]. Someone who works with encryption and decoding is referred to as a "cryptographer."…”
Section: Introductionmentioning
confidence: 99%
“…In (Sharipbaev et al, 2006;Sharipbay et al, 2017;, applications of finite automata (FA) in cryptography and general idea of information encryption by means of FA with output and FA without output were described. In (Shakhmetova, 2018;Shakhmetova et al, 2019), issues of using automata models without exit in cryptography were discussed, advantages and disadvantages of such models as the Domosi cryptosystem and its improved version were presented.…”
Section: Introductionmentioning
confidence: 99%