[1]DAS D, MISRA R. Programmable cellular automata based efficient parallel AES encryption algorithm[J]. International Journal of Network Security and Its Applications,2011,3(6):197-211.
[2]ZHANG C, PENG Q, ZHU F. Encryption based on the permutation of cellular automata[J].Computer Science,2003,30(3):171-173.(张传武, 彭启琮, 朱甫臣. 细胞自动机置换群加密技术研究[J]. 计算机科学,2003, 30(3):171-173.)
[3]NANDI S, KAR B K, CHAUDHURI P P. Theory and application of cellular automata in cryptography[J]. IEEE Transactions on Computers, 1994, 43(2): 1346-1356.
[4]JOSHI P, MUKHOPADHYAY D, ROYCHOWDH D. Design and analysis of a robust and efficient block cipher using cellular automata[C]// Proceedings of the 20th International Conference on Advanced Information Networking and Applications. Washington, DC: IEEE Computer Society, 2006:67-71.
[5]ZHANG W, QING S, WU W. Cryptanalysis of a cellular automata based cryptosystem[J].Journal of Software,2004,15(5):767-771.(张文涛, 卿斯汉, 吴文玲. 对一个基于细胞自动机的分组密码变形的分析[J]. 软件学报, 2004, 15(5): 767-771.)
[6]WU Y, HAO L, CHEN J. Block cipher based on T-shaped cellular automata[J]. Journal on Communications,2009,30(11A):52-60.(吴颖芝,郝立波,陈炬桦. T 型邻居细胞自动机的分组加密方法[J].通信学报, 2009,30(11A):52-60.)
[7]HAMEED A, MU BAHAA ELDIN A M. A cellular automata random number generator for cryptographic applications[C]// Proceedings of the 2007 International Conference on Computer Engineering and Systems. Washington, DC: IEEE Computer Society, 2007:101-105.
[8]GUAN S, ZHANG S. An evolutionary approach to the design of control cellular automata structure for random number generation[J].IEEE Transactions on Evolutionary Computation, 2003,7(1):23-36.
[9]SANTORO R, ROY S, SENTIEYS O. Search for optimal five-neighbor FPGA-based cellular automata random number generators [C]// Proceedings of the 2007 International Symposium on Signals, Systems and Electronics. Washington, DC: IEEE Computer Society, 2007:343-346.
[10]SANTOSO J, SANTOSO O S, TRILAKSONO B R. Matrix characteristics for two dimensional nongroup cellular automata[C]// Proceedings of the 2011 International Conference on Electrical Engineering and Informatics. Washington, DC: IEEE Computer Society, 2011:1-4.
[11]WANG X, LUAN D. A novel image encryption algorithm using chaos and reversible cellular automata[J]. Communications in Nonlinear Science and Numerical Simulation, 2013,18(11):3075-3085.
[12]GONG L, ZENG S, ZHOU N. Color image encryption algorithm based on cutting spectrum and 2D Arnold transform[J]. Journal of Computer Applications,2012, 32(9):2599-2602.(龚黎华,曾绍阳, 周南润.基于频谱切割和二维Arnold变换的彩色图像加密算法[J].计算机应用,2012,32(9):2599-2602.)
[13]PATIDAR V, PAREEK N K, PUROHIT G, et al. Modified substitution-diffusion image cipher using chaotic standard and logistic maps[J]. Communications in Nonlinear Science and Numerical Simulation, 2010,15(10):2755-2765. |