搜索结果: 1-8 共查到“军事学 cellular”相关记录8条 . 查询时间(0.063 秒)
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules
Lightweight Block Ciphers Side-channels
font style='font-size:12px;'>
2018/11/16
This work focuses on side-channel resilient design strategies for symmetric-key cryptographic primitives targeting lightweight applications. In light of NIST's lightweight cryptography project, design...
Cellular Automata Based S-boxes
Cellular Automata S-box Cryptographic properties
font style='font-size:12px;'>
2017/11/1
The design of Substitution Boxes (S-boxes) with good cryptographic properties represents an interesting problem. In this paper, we investigate how to evolve cellular automata (CA) rules that can be th...
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata
Cryptography Cellular automata Secret sharing
font style='font-size:12px;'>
2017/7/6
The aim of a secret sharing scheme is to share a secret among a group of participants in such a way that while authorized subsets of participants are able to recover the secret, non-authorized subsets...
ANOTEL: Cellular Networks with Location Privacy (Extended Version)
location management separation of concerns location privacy
font style='font-size:12px;'>
2016/12/10
Location management is a key component of cellular networks. From a privacy perspective, however, it is also a major weakness: location management empowers the network operator to track users. In toda...
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
Image encryption Cryptanalysis Chosen plain-text attack
font style='font-size:12px;'>
2015/12/31
Recently an image encryption scheme based on chaotic maps and memory cellular
automata has been proposed. In this paper, the security of the scheme is evaluated
and it is demonstrated that the schem...
Four Neighbourhood Cellular Automata as Better Cryptographic Primitives
Cellular Automata nonlinearity CA rule 30
font style='font-size:12px;'>
2015/12/25
Three-neighbourhood Cellular Automata (CA) are widely
studied and accepted as suitable cryptographic primitive. Rule 30, a
3-neighbourhood CA rule, was proposed as an ideal candidate for cryptograph...
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
cryptanalysis block cipher chosen-plaintext attack
font style='font-size:12px;'>
2009/6/9
This paper analyzes the Improved Cellular Message Encryp-
tion Algorithm (CMEA-I) which is an improved version of the Telecom-
munication Industry Association's Cellular Message Encryption Algo-
ri...
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata
Robust and Efficient Block Cipher Cellular Automata
font style='font-size:12px;'>
2009/3/13
Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata.