A novel keyed parallel hashing scheme based on a new chaotic system
From MaRDI portal
Publication:508257
DOI10.1016/J.CHAOS.2016.04.007zbMath1355.94044OpenAlexW2341029569MaRDI QIDQ508257
Narjes Nikzad Khasmakhi, Shahram Jamali, Meysam Asgari Chenaghlu
Publication date: 10 February 2017
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2016.04.007
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Dynamical systems involving maps of the interval (37E05)
Related Items (9)
A gallery of chaotic systems with an infinite number of equilibrium points ⋮ Chaotic hash function based on circular shifts with variable parameters ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ Minimal digital chaotic system ⋮ A Three-Dimensional Chaotic System with Square Equilibrium and No-Equilibrium ⋮ A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters ⋮ One-Way Hash Function Based on Delay-Induced Hyperchaos ⋮ Hidden attractors in a dynamical system with a sine function ⋮ Constructing chaos-based hash function via parallel impulse perturbation
Uses Software
Cites Work
- Unnamed Item
- A keyed hash function based on the modified coupled chaotic map lattice
- Can we predict the winner in a market with network effects? Competition in cryptocurrency market
- Chosen-prefix collisions for MD5 and applications
- One-way hash function construction based on the chaotic map with changeable-parameter
- Provable security against a differential attack
- One-way hash function construction based on 2D coupled map lattices
- Majority Is Not Enough: Bitcoin Mining Is Vulnerable
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- Algebraic Cryptanalysis
- Communication Theory of Secrecy Systems*
- Application of Randomization Techniques to Space-Time Convolutional Codes
- How to Break MD5 and Other Hash Functions
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
This page was built for publication: A novel keyed parallel hashing scheme based on a new chaotic system