One Dimensional Cellular Automata based security scheme providing both authentication and confidentiality

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cellular Automata Based Authentication (CAA)

Current demands for secured communication have focussed intensive interest on ‘Authentication’. There is a great demand for a highspeed low cost scheme for generation of Message Authentication Code (MAC). This paper introduces a new computational model built around a special class of Cellular Automata (CA) that can be employed for both message and image authentication. Cryptanalysis of the prop...

متن کامل

Local Information in One-Dimensional Cellular Automata

A local information measure for a one-dimensional lattice system is introduced, and applied to describe the dynamics of one-dimensional cellular automata.

متن کامل

On One-Dimensional Quantum Cellular Automata

Since Richard Feynman introduced the notion of quantum computation in 1982, various models of \quantum computers" have been proposed. These models include quantum Turing machines and quantum circuits. In this paper we deene another quantum computational model, one-dimensional quantum cellular automata, and demonstrate that any quantum Turing machine can be eeciently simulated by a one-dimension...

متن کامل

Signals in One-Dimensional Cellular Automata

In this paper, we are interested in signals, form whereby the data can be transmitted in a cellular automaton. We study generation of some signals. In this aim, we i n vestigate a notion of constructibility of increasing functions related to the production of words on the initial cell (in the sense of Fischer for the prime numbers). We establish some closure properties on this class of function...

متن کامل

Topological dynamics of one-dimensional cellular automata

1 Glossary Almost equicontinuous CA has an equicontinuous configuration. Attractor: omega-limit of a clopen invariant set. Blocking word interrupts information flow. Closing CA: distinct asymptotic configurations have distinct images. Column subshift: columns in space-time diagrams. Cross section: one-sided inverse map. ∗Université de Nice Sophia Antipolis, Département d’Informatique, Parc Valr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering

سال: 2010

ISSN: 2234-4772

DOI: 10.6109/jkiice.2010.14.7.1597