Author:
Lywait Tarun,Srinivasan Kiran,Nair Krishnadas,Bhattacharjee Kamalika
Publisher
Springer Nature Switzerland
Reference15 articles.
1. Lecture Notes in Computer Science;S Wolfram,1986
2. Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, Volume 1 (Vol. 43). Wiley, Hoboken (1997)
3. Nandi, S., Kar, B., Pal, P.: Theory and applications of cellular automata. IEEE Trans. Comput. 43(1346), 1357 (1995). https://doi.org/10.1109/12.338094
4. Tomassini, M., Perrenoud, M.: Cryptography with cellular automata. Appl. Soft Comput. 1(2), 151–160 (2001)
5. Banerjee, T., Roy Chowdhury, D. (2021). EnCash: an authenticated encryption scheme using cellular automata. In: Gwizdałła, T.M., Manzoni, L., Sirakoulis, G.C., Bandini, S., Podlaski, K. (eds.) ACRI 2020. LNCS, vol. 12599, pp. 67–79. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-69480-7_8