L-CAHASH: A novel lightweight hash function based on cellular automata for RFID

C Hanin, B Echandouri, F Omary… - … Symposium, UNet 2017 …, 2017 - Springer
Considered as the main element for building Internet of Things, Radio Frequency
IDentification (RFID) is a non-contact automatic identification technology that identifies the …

A novel hash function based on hybrid cellular automata and sponge functions

A John, A Reji, AP Manoj, A Premachandran… - Asian Symposium on …, 2022 - Springer
Hash functions serve as the fingerprint of a message. They also serve as an authentication
mechanism in many applications. Nowadays, hash functions are widely used in blockchain …

A lightweight hash function based on cellular automata for mobile network

X Zhang, Q Xu, X Li, C Wang - … on Mobile Ad-Hoc and Sensor …, 2019 - ieeexplore.ieee.org
Since the classical hash function widely used are costly for resource constrained devices, in
this paper we propose a new lightweight hash function LNHASH through Cellular Automata …

[PDF][PDF] An optimized 128-bit cellular automata-based hash function for authentication of data at rest and in transit

SK Nanda, S Mohanty, PK Pattnaik - International Journal of Electrical …, 2023 - core.ac.uk
The cryptographic hash functions are the most fundamental cryptographic concept. These
functions are used as basic building blocks for digital signatures and message …

NCASH: nonlinear cellular automata-based hash function

T Banerjee, D Roy Chowdhury - … of the Fifth International Conference on …, 2021 - Springer
In this paper, we propose a new keyed one-way double-block-length hash function by using
Non-linear Cellular Automata (CA), named as NCASH. The structure of NCASH mainly …

[PDF][PDF] Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions.

A John, J Jose - Complex Systems, 2023 - content.wolfram.com
In today's world of pervasive computing, all the devices have become smart. The need for
securing these devices becomes a need of the hour. The traditional cryptographic …

[PDF][PDF] A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments.

S Lazaar - General Letters in Mathematics (GLM), 2021 - refaad.com
The great revolution of technology and its fast growth have led to a cyber space increasingly
vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect …

On the security of the double-block-length hash function NCASH

T Banerjee, DR Chowdhury - … and Techniques in Information Security: 10th …, 2019 - Springer
In this work, we study the security analysis of a newly proposed Non-linear Cellular
Automata-based Hash function, NCASH. The uncomplicated structure of this double-block …

[PDF][PDF] On the SHA-3 hash algorithms

S Kuila, D Chawdhury, M Pal - J. Math. Inform, 2015 - researchmathsci.org
In order to complement the previous hash standards SHA-1, SHA-2, NIST organizes an
open competition in search for new hash algorithm to be named SHA-3. After thorough …

Design of Secure Hybrid Cellular Automata-Based Symmetric Cryptographic Systems

ZF Ezzahra - 2020 - toubkal.imist.ma
The use of cryptographic systems and protocols became indispensable to guarantee the
information security goals, which fall in the purpose of this thesis. New symmetric …