Author of the publication

Secret Key Specification for a Variable-Length Cryptographic Cellular Automata Model.

, , , and . PPSN (2), volume 6239 of Lecture Notes in Computer Science, page 381-390. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multistage Evolutionary Strategies for Adjusting a Cellular Automata-based Epidemiological Model., , and . CEC, page 466-473. IEEE, (2021)An Improved Robot Path Planning Model Using Cellular Automata., , , , and . TAROS, volume 10965 of Lecture Notes in Computer Science, page 183-194. Springer, (2018)Refining a Parameter Setting Evolutionary Approach for Fire Spreading Models Based on Cellular Automata., , , and . CSCI, page 480-486. IEEE, (2022)Understanding the multiclass classification of lymphomas from simple descriptors., , and . CSCI, page 1202-1208. IEEE, (2021)MACO/NDS: Many-objective Ant Colony Optimization based on Non-Dominated Sets., , and . CEC, page 1-8. IEEE, (2018)Adaptive strategies applied to evolutionary search for 2D DCT cellular automata rules., , and . GECCO, page 1147-1154. ACM, (2011)Clustering-Based Selection for the Exploration of Compiler Optimization Sequences., , , , and . ACM Trans. Archit. Code Optim., 13 (1): 8:1-8:28 (2016)Some Investigations About Synchronization and Density Classification Tasks in One-dimensional and Two-dimensional Cellular Automata Rule Spaces., , , and . AUTOMATA, volume 252 of Electronic Notes in Theoretical Computer Science, page 121-142. Elsevier, (2009)A graph-based iterative compiler pass selection and phase ordering approach., , and . LCTES, page 21-30. ACM, (2016)A Cellular Automata-Based Cryptographic Model with a Variable-Length Ciphertext., , , and . CSC, page 19-25. CSREA Press, (2010)