English
español
Please use this identifier to cite or link to this item:
http://hdl.handle.net/10261/11021
Share/Impact:
Statistics |
![]() ![]() |
|
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE | ||
|
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fúster Sabater, Amparo | - |
dc.contributor.author | Caballero Gil, Pino | - |
dc.date.accessioned | 2009-02-26T09:38:32Z | - |
dc.date.available | 2009-02-26T09:38:32Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Proc. Sixth Australasian Information Security Conference (AISC 2008) | en_US |
dc.identifier.uri | http://hdl.handle.net/10261/11021 | - |
dc.description | 6 pages, 5 tables.-- This paper appeared at the Australasian Information Security Conference (AISC2008), Wollongong, Australia, January 2008.-- Later published as paper: http://digital.csic.es/handle/10261/11004 | en_US |
dc.description.abstract | This work shows that a wide class of cryptographic sequences, the so-called interleaved sequences, can be generated by means of linear multiplicative polynomial cellular automata. In fact, this type of one-dimensional linear 90/150 cellular automata can be devised as generators of pseudo-random sequences. Moreover, these linear automata generate all the solutions of a type of difference equations with constant coefficients. Interleaved sequences are just particular solutions of such equations. In this way, linear discrete models based on cellular automata realize many popular nonlinear sequence generators of current application in stream ciphers. Thus, cryptographic sequence generators conceived and designed originally as complex nonlinear models can be easily written in terms of simple linear equivalents. | en_US |
dc.description.sponsorship | This work has been done in the frame of the project HESPERIA (http://www.proyecto-hesperia.org) supported by Centro para el Desarrollo Tecnológico Industrial (CDTI) under programme CENIT and also supported by the companies: Soluziona Consultoría y Tecnología, Unión Fenosa, Tecnobit, Visual-Tools, BrainStorm, SAC and TechnoSafe. | en_US |
dc.format.extent | 154159 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | en_US |
dc.publisher | Australian Computer Society | en_US |
dc.rights | openAccess | en_US |
dc.subject | Interleaved sequence | en_US |
dc.subject | Cellular automata | en_US |
dc.subject | Linearization | en_US |
dc.subject | Stream ciphers | en_US |
dc.subject | Cryptography | en_US |
dc.title | Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences | en_US |
dc.type | comunicación de congreso | en_US |
dc.description.peerreviewed | Peer reviewed | en_US |
dc.relation.publisherversion | http://crpit.com/abstracts/CRPITV81FusterSabater.html | en_US |
Appears in Collections: | (IFA) Comunicaciones congresos |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
CRPITV81FusterSabater.pdf | 150,55 kB | Adobe PDF | ![]() View/Open |
Show simple item record
WARNING: Items in Digital.CSIC are protected by copyright, with all rights reserved, unless otherwise indicated.