A cryptosystem based on cellular automata

被引:0
|
作者
Urías, J [1 ]
Ugalde, E [1 ]
Salazar, G [1 ]
机构
[1] Univ Autonoma San Luis Potosi, IICO, San Luis Potosi 78000, SLP, Mexico
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cryptosystems for binary information are based on two primitives: an indexed family of permutations of binary words and a generator of pseudorandom sequences of indices. A very efficient implementation of the primitives is constructed using the phenomenon of synchronization in cellular automata. (C) 1998 American Institute of Physics. [S1054-1500(98)01204-X].
引用
收藏
页码:819 / 822
页数:4
相关论文
共 50 条
  • [31] Encryption based on reversible cellular automata
    Ping, Ping
    Zhou, Yao
    Zhang, Hong
    Liu, Feng-Yu
    [J]. Tongxin Xuebao/Journal on Communications, 2008, 29 (05): : 26 - 33
  • [32] Authentication based on singular cellular automata
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 605 - 610
  • [33] Encryption based on reversible cellular automata
    Zhang, CW
    Peng, QC
    Li, YB
    [J]. 2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 1223 - 1226
  • [34] Evolving FPGA based cellular automata
    Porter, R
    Bergmann, N
    [J]. SIMULATED EVOLUTION AND LEARNING, 1999, 1585 : 114 - 121
  • [35] Simulation of SARS based on Cellular Automata
    Yu, Lei
    Xue, Huifeng
    Li, Gang
    [J]. DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 784 - 786
  • [36] Cellular automata based authentication (CAA)
    Mukherjee, M
    Ganguly, N
    Chaudhuri, PP
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2002, 2493 : 259 - 269
  • [37] Some Remarks and Tests on the DH1 Cryptosystem Based on Automata Compositions
    Domosi, Pal
    Gall, Jozsef
    Horvath, Geza
    Tihanyi, Norbert
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2019, 43 (02): : 199 - 207
  • [38] Strong Finite Automata Public Key Cryptosystem
    Chopuryan, Siranush
    Margarov, Gevorg
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 625 - 628
  • [39] Break finite automata public key cryptosystem
    Bao, F
    Igarashi, Y
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, 1995, 944 : 147 - 158
  • [40] Public Key Cryptosystem Based on Finite Automata for Multilateral Antiterrorist Activity Support
    Margarov, Gevorg
    Chopuryan, Siranush
    [J]. TERRORISM AND THE INTERNET: THREATS - TARGET GROUPS - DERADICALISATION STRATEGIES, 2010, 67 : 183 - 188