![PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications - ScienceDirect PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications - ScienceDirect](https://ars.els-cdn.com/content/image/1-s2.0-S2214212620307894-gr4.jpg)
PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications - ScienceDirect
![Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata](https://www.mdpi.com/mathematics/mathematics-11-01481/article_deploy/html/images/mathematics-11-01481-g001.png)
Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata
![Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata](https://www.mdpi.com/mathematics/mathematics-11-01481/article_deploy/html/images/mathematics-11-01481-g004.png)
Mathematics | Free Full-Text | Cryptographic Algorithm Based on Hybrid One-Dimensional Cellular Automata
![PDF) Security of Telemedical Applications over the Internet using Programmable Cellular Automata | Petre Anghelescu - Academia.edu PDF) Security of Telemedical Applications over the Internet using Programmable Cellular Automata | Petre Anghelescu - Academia.edu](https://0.academia-photos.com/attachment_thumbnails/72633562/mini_magick20211015-30964-82kctf.png?1634340896)
PDF) Security of Telemedical Applications over the Internet using Programmable Cellular Automata | Petre Anghelescu - Academia.edu
![Sensors | Free Full-Text | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks Sensors | Free Full-Text | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks](https://www.mdpi.com/sensors/sensors-21-05838/article_deploy/html/images/sensors-21-05838-g001.png)
Sensors | Free Full-Text | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
![PDF] A Lightweight Cellular Automata Based Encryption Technique for IoT Applications | Semantic Scholar PDF] A Lightweight Cellular Automata Based Encryption Technique for IoT Applications | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/19fc3d51392b69ea11e436a91eda596b6c613c53/4-Figure2-1.png)
PDF] A Lightweight Cellular Automata Based Encryption Technique for IoT Applications | Semantic Scholar
![PDF] A New Cryptographic Hash Function Based on Cellular Automata Rules 30 , 134 and Omega-Flip Network | Semantic Scholar PDF] A New Cryptographic Hash Function Based on Cellular Automata Rules 30 , 134 and Omega-Flip Network | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/1563c58daf7a9f63784ee19a98aeb529b7eb66bb/5-Table2-1.png)