Amanote Research

Amanote Research

    RegisterSign In

Cryptographic Hash Function Using Cellular Automata

International Journal of Computer Applications Technology and Research
doi 10.7753/ijcatr0505.1001
Full Text
Open PDF
Abstract

Available in full text

Date

April 25, 2016

Authors
Mohamed Mahmoud ElRakaib
Publisher

Association of Technology and Science


Related search

An Enhanced Non-Cryptographic Hash Function

International Journal of Computer Applications
2020English

Javascript Security Using Cryptographic Hash Functions

Advanced Information Systems
2019English

Cryptographic Hash Functions

2010English

An Efficient Construction of a Compression Function for Cryptographic Hash

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

The State of Cryptographic Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Grayscale Image Encryption Using Cellular Automata

International Journal of Computer Applications
2016English

Theoretical and Experimental Analysis of Cryptographic Hash Functions

Journal of Telecommunications and Information Technology
Electronic EngineeringCommunicationsElectricalComputer Networks
2019English

Cryptographic Hash Functions and Attacks – A Detailed Study

International Journal of Advanced Research in Computer Science
2020English

Design of Adder Using Quantum Cellular Automata

International Journal of Wireless and Microwave Technologies
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy