[HTML][HTML] Models of socio-cyber-physical systems security
S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev… - 2023 - monograph.com.ua
The development of technologies and computing resources has not only expanded the
range of digital services in all spheres of human activity, but also determined the range of …
range of digital services in all spheres of human activity, but also determined the range of …
[PDF][PDF] Development and research of cryptographic hash functions based on two-dimensional cellular automata
Y Tanasyuk, S Ostapov - Informatyka, Automatyka, Pomiary w …, 2018 - bibliotekanauki.pl
Software solution for cryptographic hash functions based on sponge construction with inner
state implemented as two-dimensional cellular automata (CA) has been developed. To …
state implemented as two-dimensional cellular automata (CA) has been developed. To …
OPRACOWANIE I BADANIA KRYPTOGRAFICZNYCH FUNKCJI SKRÓTU (HASH) NA PODSTAWIE DWUWYMIAROWYCH AUTOMATÓW KOMÓRKOWYCH
Y Tanasyuk, S Ostapov - … Pomiary w Gospodarce i Ochronie Środowiska, 2018 - ph.pollub.pl
Software solution for cryptographic hash functions based on sponge construction with inner
state implemented as two-dimensional cellular automata (CA) has been developed. To …
state implemented as two-dimensional cellular automata (CA) has been developed. To …
Deploying multydimensional cellular automata in the hash function construction
O Konstantynyuk, Y Tanasyuk… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Cryptographic hash functions on the basis of one-, two-and three-dimensional cellular
automata deploying pseudorandom permutation with the use of various processing rules …
automata deploying pseudorandom permutation with the use of various processing rules …
[PDF][PDF] Hash Functions Based on One-and Multy-Dimensional Cellular Automata
O Konstantynyuk, Y Tanasyuk, S Ostapov - 2017 - ir.lib.vntu.edu.ua
Cryptographic hash functions on the basis of one-, two-and three-dimensional cellular
automata deploying pseudorandom permutation with the use of various processing rules …
automata deploying pseudorandom permutation with the use of various processing rules …