A chaos-based hash function with both modification detection and localization capabilities
From MaRDI portal
Recommendations
- Analysis and improvement of a chaos-based hash function construction
- A fast and efficient chaos-based keyed hash function
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- A keyed hash function based on the modified coupled chaotic map lattice
- A combined chaotic cryptographic and hashing scheme
- Chaos Based Hash Function
- Constructing chaos-based hash function via parallel impulse perturbation
- Hash functions using chaotic iterations
- A structure-based chaotic hashing scheme
Cites work
- scientific article; zbMATH DE number 774344 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- A combined chaotic cryptographic and hashing scheme
- An improved chaotic cryptosystem with external key
- Chaos and cryptography
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- One-way hash function construction based on the chaotic map with changeable-parameter
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
Cited in
(23)- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- An anonymous key agreement protocol based on chaotic maps
- Parallel hash function construction based on coupled map lattices
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- A keyed hash function based on the modified coupled chaotic map lattice
- A revised key agreement protocol based on chaotic maps
- Collision analysis of one kind of chaos-based hash function
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A structure-based chaotic hashing scheme
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- Chaotic hash function based on the dynamic S-box with variable parameters
- Chaotic hash function based on circular shifts with variable parameters
- The design of keyed hash function based on CNN-MD structure
This page was built for publication: A chaos-based hash function with both modification detection and localization capabilities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q720114)