참고문헌
- J. Kim and J. Chon, "Decoding problem of random linear codes and its cryptographic application," J. of the Korean Institute of Communication Sciences, vol. 32, no. 6, 2015, pp. 30-38.
- E. Jang, "Synchronization and Secure Communication Application of Chaos Based Malasoma System," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 5, 2017, pp. 747-754. https://doi.org/10.13067/JKIECS.2017.12.5.747
- J. Saidov, B. Kim, J. Lee, and G. Lee, "Distributed Hardware Security System with Secure Key Update," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 671-678. https://doi.org/10.13067/JKIECS.2017.12.4.671
- N. Jang, C. Kim, S. Hong, and Y. Park, "Efficient Bit-Parallel Shifted Polynomial Basis Multipliers for All Irreducible Trinomial," J. of the Korea Institute of Information Security & Cryptology, vol. 19, no. 2, 2009, pp.49-61.
- P. Hortensius, R. McLeod, and H. Card, "Parallel random number generation for VLSI systems using cellular automata," IEEE Trans. on Computers, vol. 38, no. 10, 1989, pp. 1466-1473. https://doi.org/10.1109/12.35843
- S. Wolfram, "Cryptography with Cellular Automata," in Advances in Cryintology: Crypto '85 Proceedings, Lcture Notes in Computer Science 218. Santa Babara: Springer, 1986, pp. 429-432.
- S. Nandi, B. Kar, and P. Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography," IEEE Trans. on Computers, vol. 43, no. 12, 1994, pp. 1346-1357. https://doi.org/10.1109/12.338094
- S. Das and D. Chowdhury, "On usage of cellular automata in strengthening stream ciphers," J. Discrete Mathematical Sciences and Cryptography, vol. 14, no. 4, 2011, pp. 369-390. https://doi.org/10.1080/09720529.2011.10698343
- M. Tomassini and M. Perrenoud, "Stream Ciphers with One- and Two-Dimensional Cellular Automata," Parallel Problem Solving from Nature -PPSN VI, Lecture Notes in Computer Science 1917. Paris: Springer, 2000, pp. 722-731.
- H. Jeong, K. Park, S. Cho, and S. Kim, "Color medical image encryption using two-dimensional chaotic map and C-MLCA," Proc. of the Int. Conf. on Ubiquitous and Future Networks, Prague, Czech Republic, 2018.
- U. Choi, S. Cho, J. Kim, S. Kang, H. Kim, and S. Kim, "Color image encryption based on PC-MLCA and 3-D chaotic cat map," Proc. of the 2019 IEEE 4th Int. Conf. on Computer and Communication System, Singapore, 2019, pp. 272-277.
- P. P. Chaudhuri, D. R. Chowdhury, S. Nandi, and S. Chattopadhyay, Additive Cellular Automata Theory and Applications, vol. 1. Los Alamitos, IEEE Computer Society Press, 1997.
- K. Cattell and J. C. Muzio, "Analysis of onedimensional linear hybrid cellular automata over GF(q)," IEEE Trans. Comput-Aided Design Integrated Circuits and Systems, vol. 45, no. 7, 1996, pp. 782-792.
- S. Cho, U. Choi, H. Kim, Y. Hwang, J. Kim, and S. Heo, "New synthesis of one-dimensional 90/150 linear hybrid group cellular automata," IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 26, no. 9, 2007, pp. 1720-1724. https://doi.org/10.1109/TCAD.2007.895784
- R. McEliece, Finite Fields for Computer Scientists and Engineers. Massachustts: Springer, 1987.
- U. Choi, S. Cho, Y. Hwang, and H. Kim, "Attack using Phase Shifts of Shrunken Sequence," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 1, 2011, pp. 97-104. https://doi.org/10.13067/JKIECS.2011.6.1.097