<--- Back to Details
First PageDocument Content
Applied mathematics / Pseudorandom number generators / Cellular automata / Rule 30 / Cellular automaton / Keystream / One-time pad / Linear feedback shift register / Elementary cellular automaton / Cryptography / Stream ciphers / Mathematics
Date: 2012-09-20 14:36:17
Applied mathematics
Pseudorandom number generators
Cellular automata
Rule 30
Cellular automaton
Keystream
One-time pad
Linear feedback shift register
Elementary cellular automaton
Cryptography
Stream ciphers
Mathematics

Nonuniform Cellular Automata for Cryptography

Add to Reading List

Source URL: www.complex-systems.com

Download Document from Source Website

File Size: 130,30 KB

Share Document on Facebook

Similar Documents

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document

Cryptography / Stream ciphers / VEST / Grain / Field-programmable gate array / Altera / Xilinx / Brute-force attack / Stratix / Block cipher / Py / Data Encryption Standard

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

DocID: 1xTNL - View Document

Stream ciphers Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

DocID: 1v6Fk - View Document

Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

DocID: 1v0Wv - View Document

A Countermeasure Against Power Analysis Attacks for FSR-Based Stream Ciphers Shohreh Sharif Mansouri and Elena Dubrova Department of Electronic Systems, School of ICT KTH - Royal Institute of Technology, Stockholm Email:

DocID: 1uFXE - View Document