HIGHLIGHTS
SUMMARY
OWADAYS, the issue of cybersecurity receives a great attention from government structures as well as from public organizations. Since then, there was developed a whole number of various cryptographic transformations: symmetric ciphers, hashing algorithms, etc. N VOLUME 22(1), 2023 IMPLEMENTATION OF ENCRYPTION ALGORITHMS A. CELLULAR AUTOMATA IN CRYPTOGRAPHIC TRANSFORMATIONS Cellular automata have long been used for construction of cryptographic primitives. Frequently, the elementary one-dimensional cellular automata are used for generation of binary pseudo-random sequences, which have decent statistical characteristics. There are known applications of CA for design of hashing algorithms, block . . .
If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.