Author:
Banerjee Tapadyoti,Roy Chowdhury Dipanwita
Reference22 articles.
1. Belfedhal, A.E., Faraoun, K.M.: Building secure and fast cryptographic hash functions using programmable cellular automata. J. Comput. Inf. Technol. 23(4), 317–328 (2015)
2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: KECCAK sponge function family main document (2010)
3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: International Workshop on Selected Areas in Cryptography, pp. 320–337. Springer (2011)
4. Chang, T., Song, I., Bae, J., Kim, K.S.: Maximum length cellular automaton sequences and its application. Signal Process. 56(2), 199–203 (1997)
5. Pal Chaudhuri,P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 1. Wiley, New York (1997)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献