[HTML][HTML] Models of socio-cyber-physical systems security

S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev… - 2023 - monograph.com.ua
The development of technologies and computing resources has not only expanded the
range of digital services in all spheres of human activity, but also determined the range of …

[PDF][PDF] Development and research of cryptographic hash functions based on two-dimensional cellular automata

Y Tanasyuk, S Ostapov - Informatyka, Automatyka, Pomiary w …, 2018 - bibliotekanauki.pl
Software solution for cryptographic hash functions based on sponge construction with inner
state implemented as two-dimensional cellular automata (CA) has been developed. To …

OPRACOWANIE I BADANIA KRYPTOGRAFICZNYCH FUNKCJI SKRÓTU (HASH) NA PODSTAWIE DWUWYMIAROWYCH AUTOMATÓW KOMÓRKOWYCH

Y Tanasyuk, S Ostapov - … Pomiary w Gospodarce i Ochronie Środowiska, 2018 - ph.pollub.pl
Software solution for cryptographic hash functions based on sponge construction with inner
state implemented as two-dimensional cellular automata (CA) has been developed. To …

Deploying multydimensional cellular automata in the hash function construction

O Konstantynyuk, Y Tanasyuk… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Cryptographic hash functions on the basis of one-, two-and three-dimensional cellular
automata deploying pseudorandom permutation with the use of various processing rules …

[PDF][PDF] Hash Functions Based on One-and Multy-Dimensional Cellular Automata

O Konstantynyuk, Y Tanasyuk, S Ostapov - 2017 - ir.lib.vntu.edu.ua
Cryptographic hash functions on the basis of one-, two-and three-dimensional cellular
automata deploying pseudorandom permutation with the use of various processing rules …