[1] R. Alonso-Sanz and M. MartÃn, One-dimensional cellular automata
with memory: Patterns from a single site seed, Internat. J. Bifur.
Chaos 12 (2002), 205-226.
[2] G. Ãlvarez, A. Hernández Encinas, L. Hernández Encinas
and A. MartÃn del Rey, A secure scheme to share secret color
images, Comput. Phys. Comm. 173 (2005), 9-16.
[3] F. Bao, Cryptanalysis of a partially known cellular automata
cryptosystem, IEEE Trans. Comput. 53 (2004), 1493-1497.
[4] A. Fúster-Sabater and D. de la GuÃa-MartÃnez, Cellular
automata applications to the linearization of stream cipher
generators, Proceedings of ACRI 2004, Lect. Notes Comput. Sci. 3305
(2004), 612-621.
[5] P. Guan, Cellular automaton public-key cryptosystem, Complex
Systems. 1 (1987), 51-57.
[6] H. A. Gutowitz, Cryptography with dynamical systems, Proceedings
of the NATO Advanced Study Institute: Cellular Automata and
Cooperative Systems (1993), pp. 237-274.
[7] A. MartÃn del Rey, J. Pereira Mateus and G. RodrÃguez
Sánchez, A secret sharing scheme based on cellular automata, Appl.
Math. Comput. 170 (2005), 1356-1364.
[8] W. Meier and O. Staffelbach, Analysis of pseudorandom sequences
generated by cellular automata, Advances in Cryptology: Euro
Crypt’91 Proceedings, Lect. Notes Comput. Sci. 547 (1991),
186-189.
[9] A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied
Cryptography, CRC Press, Boca Raton, 1997.
[10] S. Nandi, B. K. Kar and P. P. Chaudhuri, Theory and applications
of cellular automata in cryptography, IEEE Trans. Comput. 43 (1994),
1346-1357.
[11] M. Seredynski and P. Bouvry, Block encryption using reversible
cellular automata, Proceedings of ACRI 2004, Lect. Notes Comput. Sci.
3305 (2004), 785-792.
[12] M. Seredynski, P. Bouvry and A. Zomaya, Cellular automata
computations and secret key cryptography, Parallel Comput. 30 (2004),
753-766.
[13] D. R. Stinson, Cryptography: Theory and Practice, Second Edition,
Chapman & Hall/CRC, Boca Raton, 2002.
[14] S. Wolfram, Random sequence generation by cellular automata, Adv.
Appl. Math. 7 (1986), 123-169.
[15] S. Wolfram, Cryptography with cellular automata, Advances in
Cryptology: Crypto’85 Proceedings, Lect. Notes Comput. Sci. 218
(1986), 429-432.