| 335 | -- | 336 | Tomasz M. Gwizdalla, Luca Manzoni. Preface |
| 337 | -- | 362 | Ambili K. N, Jimmy Jose. Inapplicability of Differential Fault Attacks Against Cellular Automata Based Lightweight Authenticated Cipher |
| 363 | -- | 379 | Ambili K. N, Jimmy Jose. Reinforcing Lightweight Authenticated Encryption Schemes Against Statistical Ineffective Fault Attack |
| 381 | -- | 399 | Mohamed Byari, Abdessamed Bernoussi, Mustapha Ouardouz, Mina Amharref. Protector Control of 3D Cellular Automata via Space Attributes: Application to Wildland Fire |
| 401 | -- | 422 | Théo Plénet, Samira El Yacoubi, Clément Raïevsky, Laurent Lefèvre. Observability and Reconstructibility of Affine Cellular Automata: Example on Random Number Reconstruction |
| 423 | -- | 442 | Alassane Koné, Allyx Fontaine, Samira El Yacoubi, Maud Loireau, Salifou Nouhou Jangorzo. Assessing the Impact of Anthropogenic Factors on Desertification Through the DESERTICAS Software |
| 443 | -- | 461 | Tapadyoti Banerjee, Dipanwita Roy Chowdhury. EnCash: An Authenticated Encryption Scheme Using Cellular Automata |
| 463 | -- | 490 | Anita John, Sai Kallupalle Mineesh Reddy, Jimmy Jose. Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata |
| 491 | -- | 512 | Irene Georgiadi, Ioakeim G. Georgoudas, Giuseppe A. Trunfio, Georgios Ch. Sirakoulis. An Interactive Cellular Automata Based Application to Foster Sustainable Forms of Movement in the Urban Fabric |