Table of Contents
VLSI Design
Volume 2008, Article ID 160728, 7 pages
Research Article

A Programmable Hardware Cellular Automaton: Example of Data Flow Transformation

Laboratoire Matériaux et Microélectronique de Provence (L2MP-POLYTECH), UMR CNRS 6137, IMT-Technopôle de Château Gombert, Marseille Cedex 20 13451, France

Received 13 April 2007; Accepted 9 December 2007

Academic Editor: Jean-Baptiste Begueret

Copyright © 2008 Samuel Charbouillot et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Sarkar, “A brief history of cellular automata,” ACM Computing Surveys, vol. 32, no. 1, pp. 80–107, 2000. View at Publisher · View at Google Scholar
  2. F. Bagnoli and A. Francescato, “A cellular automata machine,” in Cellular Automata and Modeling of Complex Physical Systems, P. Manneville, N. Boccara, G. Y. Vichniac, and R. Bidaux, Eds., p. 312, Springer, Berlin, Germany, 1990. View at Google Scholar
  3. M. Tomassini, M. Sipper, and M. Perrenoud, “On the generation of high-quality random numbers by two-dimensional cellular automata,” IEEE Transactions on Computers, vol. 49, no. 10, pp. 1146–1151, 2000. View at Publisher · View at Google Scholar
  4. R.-J. Chen, Y.-T. Lai, and J.-L. Lai, “Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2-D Von Neumann cellular automata,” in Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '06), pp. 153–156, Island of Kos, Greece, May 2006. View at Publisher · View at Google Scholar
  5. NCR GAPP Application Notes, 1985, NCR Corporation, Dayton, US.
  6. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla, USA, 1997.
  7. C. F. Baillie, Lattice Spin Models and New Algorithms: A Review of Monte Carlo Computer Simulations, World Scientific, River Edge, NJ, USA, 1990.
  8. M. Creutz, “Microcanonical Monte Carlo simulation,” Physical Review Letters, vol. 50, no. 19, pp. 1411–1414, 1983. View at Publisher · View at Google Scholar
  9. M. Creutz, “Deterministic Ising dynamics,” Annals of Physics, vol. 167, no. 1, pp. 62–72, 1986. View at Publisher · View at Google Scholar
  10. T. Toffoli and N. Margulus, “Programmable matter: concepts and realization,” Physica D, vol. 47, no. 1-2, pp. 263–272, 1991. View at Publisher · View at Google Scholar · View at MathSciNet
  11. G. Marsaglia, “Diehard,” 1998,
  13. J. Daemen and V. Rijmen, “AES Proposal: Rijndael,” September 1999,
  14. M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, and C. E. Goutis, “Comparison of the hardware architectures and FPGA implementations of stream ciphers,” in Proceedings of the 11th IEEE International Conference on Electronics, Circuits and Systems (ICECS '04), pp. 571–574, Tel-Aviv, Israel, December 2004. View at Publisher · View at Google Scholar