Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach.
Miodrag J. MihaljevicPublished in: AAECC (1997)
Keyphrases
- pseudorandom
- random number
- random number generator
- encryption algorithm
- stream cipher
- secret key
- uniformly distributed
- random numbers
- encryption algorithms
- load balancing
- key management
- authentication scheme
- high security
- peer to peer
- encryption scheme
- private key
- cellular automata
- security policies
- network security
- block cipher
- information security
- intrusion detection
- access control
- audio signal
- security mechanisms
- similarity measure