[1] SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
[2] BURKS A W.Essays on Cellular Automata[M].Urbana:University of Illinois Press,1970.1-2.
[3] MARIOT L,PICEK S,LEPORATI A,et al.Cellular automata based S-boxes[J].Cryptography and Communications,2019,11(1):41-62.
[4] NIST.Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA-3) Family[EB/OL].https://csrc.nist.gov/news/2007/request-for-candidate-algorithm-nominations,2007-11-02.
[5] BERTONI G,DAEMEN J,PEETERS M,et al.The KECCAK Reference[R/OL].https://keccak.team/files/Keccak-reference-3.0.pdf,2011-01-14.
[6] SIMON H.Neural Networks:A Comprehensive Foundation[M].India:Pearson Education Pte Ltd,2002.23-35.
[7] 张霞.S盒的神经网络实现及其动力学性质[D].杭州:杭州电子科技大学应用数学系,2015.7-24.
[8] MUKHOPADHYAY D,ROYCHOWDHURY D.Cellular automata:an ideal candidate for a block cipher[A].Ghosh R K.International Conference on Distributed Computing and Internet Technology[C].Bhubaneswar:Springer,2004.452-457.
[9] JOSHI P,MUKHOPADHYAY D,ROYCHOWDHURY D.Design and analysis of a robust and efficient block cipher using cellular automata[A].Watanabe K.International Conference on Advanced Information Networking and Applications[C].Vienna:IEEE Computer Society,2006.67-71.
[10] BHATTACHARYA D,BANSAL N,BANERJEE A,et al.A new optimal S-box design[A].Gupta S K.International Conference on Information Systems Security[C].Delhi:Springer,2007.77-90.
[11] STJEPAN P,MARIOT L,YANG B,et al.Design of S-boxes defined with cellular automata rules[A].Valero M.International Conference on Computing Frontiers[C].Siena:ACM,2017.409-414.
[12] 关杰,黄俊君.一类新的基于元胞自动机的S盒的密码学性质分析[J].通信学报,2019,40(5):192-200. GUAN J,HUANG J J.Research on cryptographic properties of a new S-box based on cellular automaton[J].Journal on Communications,2019,40(5):192-200.(in Chinese)
[13] BIHAM E.A fast new DES implementation in software[A].Biham E.4th International Workshop on Fast Software Encryption[C].Haifa:Springer,1997.260-271.
[14] 金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.174-201.
[15] PIEPRZYK J,FINKELSTEIN G.Towards effective nonlinear cryptosystem design[J].IEEE Proceedings E-Computers and Digital Techniques,2005,135(6):325-335.
[16] 江志松.元胞自动机的语法复杂性[D].苏州:苏州大学数学系,2001.2-4.
[17] CHEN F Y,CHEN G R,HE G,et al.Universal perceptron and DNA-like learning algorithm for binary neural networks:LSBF and PBF Implementations[J].IEEE Trans on Neural Networks,2009,20(10):1645-1658.
[18] CHEN F Y,CHEN G R,HE Q,et al.Universal perceptron and DNA-like learning algorithm for binary neural networks:Non-LSBF implementations[J].IEEE Trans on Neural Networks,2009,20(8):1293-1301. |