By Topic

Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Vandewalle, J. ; Dept. Elektrotech., Katholieke Univ., Leuven, Belgium ; Preneel, B. ; Csapodi, M.

The goal of this contribution is threefold: (1) to review the basic needs for information security in our modern society; (2) to show how these needs can be satisfied using cryptographic methods (this is basically a review of the state of the art of cryptography); and (3) to study the potentials of cellular automata (CA) and cellular neural networks (CNN) for implementing these cryptographic protection methods. It is clear that the main advantages of CA and CNN technology are the intrinsic speed and the narrow link between the CNN hardware and the medium (still or moving images)

Published in:

Cellular Neural Networks and Their Applications Proceedings, 1998 Fifth IEEE International Workshop on

Date of Conference:

14-17 Apr 1998