You are viewing the course site for a past offering of this course. The current offering may be found here.
Lecture 12: Monte Carlo Integration (60)
smsunarto

I noticed that the algorithm for Rule 30 is somewhat similar to what you would find from a hashing function and wondered whether you can use it for that.

Apparently, someone did a cryptanalysis on it: https://www.semanticscholar.org/paper/A-New-Cryptographic-Hash-Function-Based-on-Cellular-Jamil-Mahmood/1563c58daf7a9f63784ee19a98aeb529b7eb66bb

You must be enrolled in the course to comment