{"title":"数据安全问题,加密保护方法,以及细胞神经网络和细胞自动机的使用","authors":"J. Vandewalle, B. Preneel, M. Csapodi","doi":"10.1109/CNNA.1998.685326","DOIUrl":null,"url":null,"abstract":"The goal of this contribution is threefold: (1) to review the basic needs for information security in our modern society; (2) to show how these needs can be satisfied using cryptographic methods (this is basically a review of the state of the art of cryptography); and (3) to study the potentials of cellular automata (CA) and cellular neural networks (CNN) for implementing these cryptographic protection methods. It is clear that the main advantages of CA and CNN technology are the intrinsic speed and the narrow link between the CNN hardware and the medium (still or moving images).","PeriodicalId":171485,"journal":{"name":"1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata\",\"authors\":\"J. Vandewalle, B. Preneel, M. Csapodi\",\"doi\":\"10.1109/CNNA.1998.685326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The goal of this contribution is threefold: (1) to review the basic needs for information security in our modern society; (2) to show how these needs can be satisfied using cryptographic methods (this is basically a review of the state of the art of cryptography); and (3) to study the potentials of cellular automata (CA) and cellular neural networks (CNN) for implementing these cryptographic protection methods. It is clear that the main advantages of CA and CNN technology are the intrinsic speed and the narrow link between the CNN hardware and the medium (still or moving images).\",\"PeriodicalId\":171485,\"journal\":{\"name\":\"1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-04-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CNNA.1998.685326\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNNA.1998.685326","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security issues, cryptographic protection methods, and the use of cellular neural networks and cellular automata
The goal of this contribution is threefold: (1) to review the basic needs for information security in our modern society; (2) to show how these needs can be satisfied using cryptographic methods (this is basically a review of the state of the art of cryptography); and (3) to study the potentials of cellular automata (CA) and cellular neural networks (CNN) for implementing these cryptographic protection methods. It is clear that the main advantages of CA and CNN technology are the intrinsic speed and the narrow link between the CNN hardware and the medium (still or moving images).