A secure hash function based on cellular automata.
Jae Woo YoonSang-Uk ShinKyung Hyune RheePublished in: ICISC (1998)
Keyphrases
- cellular automata
- hash functions
- stream cipher
- block cipher
- provably secure
- encryption scheme
- similarity search
- secret key
- cellular automaton
- hashing algorithm
- locality sensitive hashing
- hamming distance
- lattice gas
- hash table
- cellular automata model
- diffie hellman
- key management
- hash tables
- chaotic dynamics
- cellular automaton model
- standard model
- security analysis
- security requirements
- signature scheme
- data distribution
- multi dimensional
- neural network
- database