Date of publication mar-29, 2023, date of current version oct-19, 2022. www.computingonline.net / computing@computingonline.net

HIGHLIGHTS

SUMMARY

    OWADAYS, the issue of cybersecurity receives a great attention from government structures as well as from public organizations. Since then, there was developed a whole number of various cryptographic transformations: symmetric ciphers, hashing algorithms, etc. N VOLUME 22(1), 2023 IMPLEMENTATION OF ENCRYPTION ALGORITHMS A. CELLULAR AUTOMATA IN CRYPTOGRAPHIC TRANSFORMATIONS Cellular automata have long been used for construction of cryptographic primitives. Frequently, the elementary one-dimensional cellular automata are used for generation of binary pseudo-random sequences, which have decent statistical characteristics. There are known applications of CA for design of hashing algorithms, block . . .

     

    Logo ScioWire Beta black

    If you want to have access to all the content you need to log in!

    Thanks :)

    If you don't have an account, you can create one here.

     

Scroll to Top

Add A Knowledge Base Question !

+ = Verify Human or Spambot ?