Title variants
Languages of publication
Abstracts
In this work, we study the structure of two-dimensional linear hybrid cellular automata with respect to adiabatic boundary condition. Further, we check the performance of hybrid cellular automata constructed through the members of this family in generating pseudo random bits.
Discipline
Journal
Year
Volume
Issue
Pages
534-537
Physical description
Dates
published
2014-02
References
- 1. D.R. Stinson, Cryptography Theory and Practice, CRC Press, Boca Raton 2006, p. 323
- 2. S. Wolfram, in: Advances in Cryptology: Crypto '85 Proc., Ed. H.C. Williams, Springer, New York1986, p. 429
- 3. S. Nandi, B.K. Kar, P.P. Chaudhuri, doi: 10.1109/12.338094, IEEE Trans. Comput. 43, 1346 (1994)
- 4. A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton 1997, p. 181
- 5. F. Temiz, I. Siap, H. Akin, M.E. Koroglu, AWER Procedia 1, 1649 (2012)
- 6. J.L. Schiff, A Discrete View of the World, Wiley, New Jersey 2008, p. 43
- 7. S. Uguz, U. Sahin, H. Akin, I. Siap, doi: 10.1142/S021812741430002X, Int. J. Bifurc. Chaos 24, 14300 (2014)
- 8. C. Fraile Rubio, L. Hernández Encinas, S. Hoya White, A. Martín del Rey, G. Rodríguez Sánchez, Neural Parallel Sci. Comput. 12, 175 (2004)
Document Type
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.bwnjournal-article-appv125n2120kz