2004
DOI: 10.1016/j.parco.2003.12.014
|View full text |Cite
|
Sign up to set email alerts
|

Cellular automata computations and secret key cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
87
0
7

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(96 citation statements)
references
References 5 publications
0
87
0
7
Order By: Relevance
“…Membership to class K2 is characterized by the passing of five specific statistical tests. Such tests, whose validity is well known [13,37,47,7,28,22,7] We have generated a 20,000-bit wide sequence of numbers by means of our scheme and we have performed successfully the five tests above. In detail, the sequence passed the monobit test since the measured result 10,206 lies in the allowed interval (that is, from 9,654 to 10,346).…”
Section: Randomness Of the Generation Schemementioning
confidence: 88%
“…Membership to class K2 is characterized by the passing of five specific statistical tests. Such tests, whose validity is well known [13,37,47,7,28,22,7] We have generated a 20,000-bit wide sequence of numbers by means of our scheme and we have performed successfully the five tests above. In detail, the sequence passed the monobit test since the measured result 10,206 lies in the allowed interval (that is, from 9,654 to 10,346).…”
Section: Randomness Of the Generation Schemementioning
confidence: 88%
“…the chaotic class) to evolve into Group I or II (i.e. point attractors or limit cycles with extremely small periods), according to Wolfram's ECA classification [4][5]. Therefore, such boundary conditions preclude these ECAs from achieving strong random number generators.…”
Section: Discussionmentioning
confidence: 99%
“…Both LFSRs and CAs have been used extensively in a wide area of applications, particularly random number generation for Mont Carlo simulation, communications, cryptography and network security [1][2][3][4][5][6][7][8]. LFSRs, albeit simple in structure and design were proven to have comparatively weak statistical featured when utilized in the production of pseudo random numbers [2].…”
Section: Introductionmentioning
confidence: 99%
“…Two types of keys are involved in this process: the long sequence of the C k Cipher Keys generated by ISM and the secret key S k (Seredynski et al, 2004).…”
Section: Ism-based Image Encryption/decryption Systemmentioning
confidence: 99%