{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:18:28Z","timestamp":1757312308825,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811905414"},{"type":"electronic","value":"9789811905421"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0542-1_16","type":"book-chapter","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T05:02:47Z","timestamp":1651035767000},"page":"221-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions"],"prefix":"10.1007","author":[{"given":"Anita","family":"John","sequence":"first","affiliation":[]},{"given":"Alan","family":"Reji","sequence":"additional","affiliation":[]},{"given":"Ajay P","family":"Manoj","sequence":"additional","affiliation":[]},{"given":"Atul","family":"Premachandran","sequence":"additional","affiliation":[]},{"given":"Basil","family":"Zachariah","sequence":"additional","affiliation":[]},{"given":"Jimmy","family":"Jose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"16_CR1","unstructured":"A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. Rep. NIST Special Publication (SP) 800-22, Rev. 1a, Includes updates as of April 2010, National Institute of Standards and Technology, Gaithersburg (2010)"},{"key":"16_CR2","first-page":"1","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"JP Aumasson","year":"2010","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: QUARK: A lightweight hash. In: Mangard, S., Standaert, F.X. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2010, pp. 1\u201315. Springer, Berlin (2010)"},{"key":"16_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van\u00a0Assche, G.: Sponge functions. In: ECRYPT hash workshop, vol.\u00a02007. Citeseer (2007)"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-78967-3_11","volume-title":"Advances in Cryptology - EUROCRYPT 2008","author":"G Bertoni","year":"2008","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the sponge construction. In: Smart, N. (ed.) Advances in Cryptology - EUROCRYPT 2008, pp. 181\u2013197. Springer, Berlin (2008)"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-38348-9_19","volume-title":"Advances in Cryptology - EUROCRYPT 2013","author":"G Bertoni","year":"2013","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak. In: Johansson, T., Nguyen, P.Q. (eds.) Advances in Cryptology - EUROCRYPT 2013, pp. 313\u2013314. Springer, Berlin (2013)"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: SPONGENT: A lightweight hash function. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 312\u2013325. Springer, Berlin (2011)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: Katan and ktantan \u2013 A family of small and efficient hardware-oriented block ciphers. In: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES \u201909, pp. 272-288. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-642-33350-7_61","volume-title":"Cellular Automata","author":"K Chakraborty","year":"2012","unstructured":"Chakraborty, K., Chowdhury, D.R.: CSHR: Selection of cryptographically suitable hybrid cellular automata rule. In: Sirakoulis, G.C., Bandini, S. (eds.) Cellular Automata, pp. 591\u2013600. Springer, Berlin (2012)"},{"key":"16_CR9","first-page":"412","volume":"2006","author":"D Chang","year":"2006","unstructured":"Chang, D.: Preimage attacks on Cellhash, Subhash and Strengthened versions of Cellhash and Subhash. IACR Cryptol. ePrint Arch. 2006, 412 (2006)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Daemen, J., Govaerts, R., Vandewalle, J.: A framework for the design of one-way hash functions including cryptanalysis of Damg\u00e5rd\u2019s one-way function based on a cellular automaton. In: International Conference on the Theory and Application of Cryptology, pp. 82\u201396. Springer (1991)","DOI":"10.1007\/3-540-57332-1_7"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B.: A design principle for hash functions. In: Conference on the Theory and Application of Cryptology, pp. 416\u2013427. Springer (1989)","DOI":"10.1007\/0-387-34805-0_39"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-89255-7_10","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"M Gorski","year":"2008","unstructured":"Gorski, M., Lucks, S., Peyrin, T.: Slide attacks on a class of hash functions. In: Pieprzyk, J. (ed.) Advances in Cryptology - ASIACRYPT 2008, pp. 143\u2013160. Springer, Berlin (2008)"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology - CRYPTO 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway, P. (ed.) Advances in Cryptology - CRYPTO 2011, pp. 222\u2013239. Springer, Berlin (2011)"},{"key":"16_CR14","unstructured":"Hammad, B.T., Jamil, N., Rusli, M.E., Reza, M.: A survey of lightweight cryptographic hash function. In: International Journal of Scientific and Engineering Research, vol.\u00a08 (2017)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Hanin, C., Echandouri, B., Omary, F., Bernoussi, S.E.: L-CAHASH: A novel lightweight hash function based on cellular automata for RFID. In: UNet (2017)","DOI":"10.1109\/WINCOM.2017.8238158"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Maximov, A., Meier, W.: A stream cipher proposal: Grain-128. In: 2006 IEEE International Symposium on Information Theory, pp. 1614\u20131618 (2006)","DOI":"10.1109\/ISIT.2006.261549"},{"key":"16_CR17","unstructured":"Jamil, N., Mahmood, R.: A new cryptographic hash function based on cellular automata rules 30 134 and omega-flip network (2012)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Kuila, S., Saha, D., Pal, M., Chowdhury, D.R.: CASH: Cellular automata based parameterized hash. In: International Conference on Security, Privacy, and Applied Cryptography Engineering, pp. 59\u201375. Springer (2014)","DOI":"10.1007\/978-3-319-12060-7_5"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Efficient permutation instructions for fast software cryptography. IEEE Micro 21(6), 56\u201369 (2001)","DOI":"10.1109\/40.977759"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Lee, R.B., Shi, Z.J., Yin, Y.L., Rivest, R.L., Robshaw, M.J.B.: On permutation operations in cipher design. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC\u201904), vol. 2, p.\u00a0569. IEEE Computer Society, USA (2004)","DOI":"10.1109\/ITCC.2004.1286714"},{"key":"16_CR21","first-page":"5658","volume":"27","author":"SM Matyas","year":"1985","unstructured":"Matyas, S.M.: Generating strong one-way functions with cryptographic algorithm. IBM Tech. Disclos. Bull. 27, 5658\u20135659 (1985)","journal-title":"IBM Tech. Disclos. Bull."},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: One way hash functions and DES. In: Conference on the Theory and Application of Cryptology, pp. 428\u2013446. Springer (1989)","DOI":"10.1007\/0-387-34805-0_40"},{"key":"16_CR23","unstructured":"Mihaljevic, M., Zheng, Y., Imai, H.: A fast cryptographic hash function based on linear cellular automata over GF(q) (1998)"},{"key":"16_CR24","first-page":"452","volume-title":"Distributed Computing and Internet Technology","author":"D Mukhopadhyay","year":"2005","unstructured":"Mukhopadhyay, D., RoyChowdhury, D.: Cellular automata: an ideal candidate for a block cipher. In: Ghosh, R.K., Mohanty, H. (eds.) Distributed Computing and Internet Technology, pp. 452\u2013457. Springer, Berlin (2005)"},{"key":"16_CR25","unstructured":"NIST Statistical Test Suite. https:\/\/csrc.nist.gov\/projects\/random-bit-generation\/documentation-and-software. Accessed 01 Nov 2021"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm (1992)","DOI":"10.17487\/rfc1321"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Sadak, A., Echandouri, B., Ziani, F.E., Hanin, C., Omary, F.: LCAHASH-1.1: A new design of the lcahash system for iot. Int. J. Adv. Comput. Sci. Appl. 10(11) (2019)","DOI":"10.14569\/IJACSA.2019.0101134"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Sadak, A., Ziani, F.E., Echandouri, B., Hanin, C., Omary, F.: HCAHF: A new family of ca-based hash functions. Int. J. Adv. Comput. Sci. Appl. 10(12) (2019)","DOI":"10.14569\/IJACSA.2019.0101267"},{"key":"16_CR29","unstructured":"Secure Hash Standard, FIPS publication 180-1. National Institute of Standards and Technology (1995)"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Tomassini, M., Perrenoud, M.: Stream ciphers with one-and two-dimensional cellular automata. In: International Conference on Parallel Problem Solving from Nature, pp. 722\u2013731. Springer (2000)","DOI":"10.1007\/3-540-45356-3_71"},{"key":"16_CR31","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology - EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) Advances in Cryptology - EUROCRYPT 2005, pp. 19\u201335. Springer, Berlin (2005)"},{"key":"16_CR32","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201985 Proceedings","author":"S Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) Advances in Cryptology \u2013 CRYPTO \u201985 Proceedings, pp. 429\u2013432. Springer, Berlin (1986)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of First Asian Symposium on Cellular Automata Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0542-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T05:04:46Z","timestamp":1651035886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0542-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811905414","9789811905421"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0542-1_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Symposium on Cellular Automata Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ascat2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}