{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:11:50Z","timestamp":1729635110343,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528309","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:27:58Z","timestamp":1470421678000},"page":"93-96","source":"Crossref","is-referenced-by-count":0,"title":["On the independence of cycles produced with uniform and heterogeneous ELCAs"],"prefix":"10.1109","author":[{"given":"Horia-Nicolai","family":"Teodorescu","sequence":"first","affiliation":[]},{"given":"Arnab","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EHB.2015.7391560"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.03.017"},{"key":"ref12","first-page":"166","article-title":"On the Regularities and Randomness of the Dynamics of Simple and Composed CAs with Applications","volume":"18","author":"teodorescu","year":"2015","journal-title":"Romanian Journal of Information Science and Technology (ROMJIST)"},{"key":"ref13","article-title":"Detailed analysis of Equal Length Cellular Automata with fixed boundaries","author":"mitra","year":"2016","journal-title":"J Cellular Automata (JCA)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15979-4_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTCC.2015.7321406"},{"key":"ref4","first-page":"1001","article-title":"Theory of Additive Cellular Automata","volume":"xxi","author":"ganguly","year":"2001","journal-title":"Fundamenta Informaticae"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/12.338094"},{"key":"ref6","first-page":"153","article-title":"CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software","volume":"9","author":"das","year":"2014","journal-title":"J Cellular Automata (JCA)"},{"key":"ref5","first-page":"295","article-title":"Pseudorandom Bit Generators from Enhanced Cellular Automata","volume":"10","author":"spencer","year":"2015","journal-title":"J Cellular Automata (JCA)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3615"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"397","DOI":"10.14257\/ijsia.2013.7.5.36","article-title":"An Encryption Method for QR Code Image Based on ECA","volume":"7","author":"xiaoyang","year":"2013","journal-title":"International Journal on Security and its Applications (IJSIA)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(91)90116-E"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.11.021"},{"key":"ref9","first-page":"303","article-title":"Analysis of Hash Functions and Cellular Automata Based Schemes","volume":"7","author":"jeon","year":"2013","journal-title":"International Journal on Security and its Applications (IJSIA)"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528309.pdf?arnumber=7528309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:05:17Z","timestamp":1498334717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528309","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}