On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography.
Biswanath SethiSukanta DasPublished in: SSCC (2016)
Keyphrases
- symmetric key
- asynchronous cellular automata
- security analysis
- key management
- security requirements
- security protocols
- encryption scheme
- public key cryptography
- pattern formation
- public key
- diffie hellman
- data protection
- security mechanisms
- encryption algorithm
- secure communication
- smart card
- key distribution
- security model
- security properties
- secret key
- resource constrained
- security services
- digital signature
- cellular automata
- elliptic curve
- wireless sensor networks
- access control
- ad hoc networks
- third party
- potential field
- operating system
- signature scheme
- information security
- provably secure
- security issues
- boundary conditions
- data management