Cellular Automata - Innovative Modelling for Science and Engineering 2011
DOI: 10.5772/15803
|View full text |Cite
|
Sign up to set email alerts
|

Deeper Investigating Adequate Secret Key Specifications for a Variable Length Cryptographic Cellular Automata Based Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 12 publications
0
2
0
2
Order By: Relevance
“…Later on, it was shown that an appropriate specification of the secret key gives a low probability to this failure occurrence [Oliveira et al (2010b)], expecting to rarely apply this contour procedure keeping the ciphertext size close to the plaintext. This specification was deeper investigated in [Oliveira et al (2010c)] and [Oliveira et al (2011)]. Additionally, a cryptographic model that employs a lattice with a fixed extra boundary was investigated in [Silva et al (2016)], which applies the reverse algorithm proposed by Wolfram.…”
Section: Related Workmentioning
confidence: 99%
“…Later on, it was shown that an appropriate specification of the secret key gives a low probability to this failure occurrence [Oliveira et al (2010b)], expecting to rarely apply this contour procedure keeping the ciphertext size close to the plaintext. This specification was deeper investigated in [Oliveira et al (2010c)] and [Oliveira et al (2011)]. Additionally, a cryptographic model that employs a lattice with a fixed extra boundary was investigated in [Silva et al (2016)], which applies the reverse algorithm proposed by Wolfram.…”
Section: Related Workmentioning
confidence: 99%
“…A general method for pre-image computation was investigated by (WUEN-SCHE, 2008;OLIVEIRA et al, 2008), which were limited by the challenge of assuring the existence of a unique pre-image for every possible CA lattice. Further investigation included the application of wrap procedures that ensured the application of the encryption procedure to any given plaintext (OLIVEIRA et al, 2010;OLIVEIRA et al, 2010;MARTINS;ALT, 2011). However, these approaches still resulted in ciphertext with increased length.…”
Section: Cellular Automata Applied To Cryptographymentioning
confidence: 99%
“…Análises e experimentos Estudos da literatura ( [Oliveira et al 2001], [Packard 1988], [Mitchell et al 1994] e [Oliveira et al 2010]) apresentaram problemas em que existe relação entre a classe de comportamento dinâmico de uma regra de transição do AC e o desempenho da mesma, numa tarefa de computação especíca. Um exemplo disso é a indicação de que as regras caóticas apresentam melhor desempenho em aplicações de criptograa [Oliveira et al 2010]. Outro exemplo de problema onde existe essa relação é no estudo das tarefas de computação implícita dos ACs, tais como a tarefa da classicação da densidade (TCD) e a tarefa de sincronização (TS) [Oliveira et al 2001].…”
Section: Capítulounclassified
“…Em outras aplicações, o uso desses parâmetros apresentou uma melhora signicativa no desempenho dos algoritmos que resolvem tais problemas. Como exemplo, podem ser citadas as tarefas que estudam a capacidade computacional dos ACs [Mitchell et al 1994] [Oliveira et al 2001] [Oliveira et al 2010.…”
Section: Capítulo 1 Introduçãounclassified