References

AN MCA-BASED ALGORITHM TO ENCRYPT TEXT DATA


[1] R. Alonso-Sanz and M. Martín, One-dimensional cellular automata with memory: Patterns from a single site seed, Internat. J. Bifur. Chaos 12 (2002), 205-226.

[2] G. Álvarez, A. Hernández Encinas, L. Hernández Encinas and A. Martín del Rey, A secure scheme to share secret color images, Comput. Phys. Comm. 173 (2005), 9-16.

[3] F. Bao, Cryptanalysis of a partially known cellular automata cryptosystem, IEEE Trans. Comput. 53 (2004), 1493-1497.

[4] A. Fúster-Sabater and D. de la Guía-Martínez, Cellular automata applications to the linearization of stream cipher generators, Proceedings of ACRI 2004, Lect. Notes Comput. Sci. 3305 (2004), 612-621.

[5] P. Guan, Cellular automaton public-key cryptosystem, Complex Systems. 1 (1987), 51-57.

[6] H. A. Gutowitz, Cryptography with dynamical systems, Proceedings of the NATO Advanced Study Institute: Cellular Automata and Cooperative Systems (1993), pp. 237-274.

[7] A. Martín del Rey, J. Pereira Mateus and G. Rodríguez Sánchez, A secret sharing scheme based on cellular automata, Appl. Math. Comput. 170 (2005), 1356-1364.

[8] W. Meier and O. Staffelbach, Analysis of pseudorandom sequences generated by cellular automata, Advances in Cryptology: Euro Crypt’91 Proceedings, Lect. Notes Comput. Sci. 547 (1991), 186-189.

[9] A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997.

[10] S. Nandi, B. K. Kar and P. P. Chaudhuri, Theory and applications of cellular automata in cryptography, IEEE Trans. Comput. 43 (1994), 1346-1357.

[11] M. Seredynski and P. Bouvry, Block encryption using reversible cellular automata, Proceedings of ACRI 2004, Lect. Notes Comput. Sci. 3305 (2004), 785-792.

[12] M. Seredynski, P. Bouvry and A. Zomaya, Cellular automata computations and secret key cryptography, Parallel Comput. 30 (2004), 753-766.

[13] D. R. Stinson, Cryptography: Theory and Practice, Second Edition, Chapman & Hall/CRC, Boca Raton, 2002.

[14] S. Wolfram, Random sequence generation by cellular automata, Adv. Appl. Math. 7 (1986), 123-169.

[15] S. Wolfram, Cryptography with cellular automata, Advances in Cryptology: Crypto’85 Proceedings, Lect. Notes Comput. Sci. 218 (1986), 429-432.