Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata.
Alaa Eddine BelfedhalKamel Mohamed FaraounPublished in: J. Comput. Inf. Technol. (2015)
Keyphrases
- cellular automata
- hash functions
- stream cipher
- encryption scheme
- block cipher
- authentication protocol
- cellular automaton
- similarity search
- locality sensitive
- cellular automata model
- order preserving
- locality sensitive hashing
- discrete dynamical systems
- chaotic dynamics
- secret key
- lattice gas
- pattern formation
- security analysis
- cellular automaton model
- signature scheme
- hamming distance
- data distribution
- standard model
- path planner
- nearest neighbor search
- galois field
- database
- encryption key
- key management
- hamming space
- database management systems
- similarity measure