{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:02:12Z","timestamp":1725512532013},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540718048"},{"type":"electronic","value":"9783540718055"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71805-5_6","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T17:01:18Z","timestamp":1182358878000},"page":"52-60","source":"Crossref","is-referenced-by-count":2,"title":["Message Authentication Protocol Based on Cellular Automata"],"prefix":"10.1007","author":[{"given":"Angel Mart\u00edn","family":"Rey","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.cpc.2005.07.002","volume":"173","author":"G. \u00c1lvarez","year":"2005","unstructured":"\u00c1lvarez, G., Hern\u00e1ndez, A., Hern\u00e1ndez, L., Mart\u00edn, A.: A secure scheme to share secret color images. Comput. Phys. Comm.\u00a0173, 9\u201316 (2005)","journal-title":"Comput. Phys. Comm."},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/TC.2004.94","volume":"53","author":"F. Bao","year":"2004","unstructured":"Bao, F.: Cryptanalysis of Partially Known Cellular Automaton Cryptosystem. IEEE Trans. Comput.\u00a053, 1493\u20131497 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology\u00a04, 3\u201372 (1991)","journal-title":"J. Cryptology"},{"key":"6_CR4","volume-title":"Additive cellular automata","author":"P. Chaudhuri","year":"1997","unstructured":"Chaudhuri, P., Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive cellular automata, vol.\u00a01. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","volume-title":"Advances in Cryptology: Proc. of Crypto\u201989","author":"I. Damgard","year":"1990","unstructured":"Damgard, I.: A design principle for hash functions, Advances in Cryptology: Proc. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 416\u2013427. Springer, Berlin Heidelberg New York (1990)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/S1383-7621(00)00058-8","volume":"47","author":"P. Dasgupta","year":"2001","unstructured":"Dasgupta, P., Chattopadhyay, S., Sengupta, I.: Theory and application of non-group cellular automata for message authentication. Syst. Architecture\u00a047, 383\u2013404 (2001)","journal-title":"Syst. Architecture"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/978-3-540-30479-1_63","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2004","unstructured":"F\u00faster-Sabater, A., de la Gu\u00eda-Mart\u00ednez, D.: Cellular automata applications to the linearization of stream cipher generators. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 612\u2013621. Springer, Berlin Heidelberg New York (2004)"},{"key":"6_CR8","unstructured":"Guan, P.: Cellular automaton public-key cryptosystem, Complex Systems\u00a01 (1987) 51\u201357"},{"key":"6_CR9","first-page":"1356","volume":"170","author":"A. Mart\u00edn","year":"2005","unstructured":"Mart\u00edn, A., Pereira, J., Rodr\u00edguez, G.: A secret sharing scheme based on cellular automata. Math. Comput.\u00a0170, 1356\u20131364 (2005)","journal-title":"Math. Comput."},{"key":"6_CR10","volume-title":"Handbook of Applied Cryptography,","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, CRC Press, Boca Raton, FL (1997)"},{"key":"6_CR11","first-page":"40","volume":"E82-A","author":"M. Mihaljevic","year":"1999","unstructured":"Mihaljevic, M., Zheng, Y., Imai, H.: A family of fast dedicated one-way hash functions based on linear cellular automata over GF(q). IEICE Trans. Fundamentals\u00a0E82-A, 40\u201347 (1999)","journal-title":"IEICE Trans. Fundamentals"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45830-1_25","volume-title":"Cellular Automata","author":"M. Mukherjee","year":"2002","unstructured":"Mukherjee, M., Ganguly, N., Chaudhuri, P.P.: Cellular automata based authentication. In: Bandini, S., Chopard, B., Tomassini, M. (eds.) ACRI 2002. LNCS, vol.\u00a02493, pp. 259\u2013269. Springer, Berlin Heidelberg New York (2002)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S. Nandi","year":"1994","unstructured":"Nandi, S., Kar, B.K., Chaudhuri, P.P.: Theory and applications of cellular automata in cryptography, IEEE Trans. IEEE Trans. Comput.\u00a043, 1346\u20131357 (1994)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/978-3-540-30479-1_81","volume-title":"Cellular Automata","author":"M. Seredynski","year":"2004","unstructured":"Seredynski, M., Bouvry, P.: Block encryption using reversible cellular automata. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 785\u2013792. Springer, Berlin Heidelberg New York (2004)"},{"key":"6_CR15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1763.001.0001","volume-title":"Cellular automata machines","author":"T. Toffoli","year":"1987","unstructured":"Toffoli, T., Margolus, N.: Cellular automata machines. The MIT Press, Cambridge, MA (1987)"},{"key":"6_CR16","volume-title":"Theory of self-reproducing automata","author":"J. Neumann von","year":"1996","unstructured":"von Neumann, J.: Theory of self-reproducing automata ((edited and completed by A.W. Burks)). University of Illinois Press, Illinois (1996)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with cellular automata, Advances in Cryptology: Proc. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Berlin Heidelberg New York (1986)"},{"key":"6_CR18","unstructured":"Wolfram, S.: A new kind of science, Wolfram Media, Champaign, Illinois (2002)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutinary Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71805-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:26:55Z","timestamp":1605763615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71805-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540718048","9783540718055"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71805-5_6","relation":{},"subject":[]}}