A structure-based chaotic hashing scheme
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 49432 (Why is no real title available?)
- scientific article; zbMATH DE number 3473265 (Why is no real title available?)
- scientific article; zbMATH DE number 1219618 (Why is no real title available?)
- scientific article; zbMATH DE number 1302838 (Why is no real title available?)
- scientific article; zbMATH DE number 503258 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- A chaos-based hash function with both modification detection and localization capabilities
- A combined chaotic cryptographic and hashing scheme
- A descent extension of the Polak-Ribière-Polyak conjugate gradient method
- A fast and efficient chaos-based keyed hash function
- A keyed hash function based on the modified coupled chaotic map lattice
- A method for obtaining digital signatures and public-key cryptosystems
- A more secure parallel keyed hash function based on chaotic neural network
- A new digital signature scheme based on chaotic maps
- A novel combined cryptographic and hash algorithm based on chaotic control character
- A novel non-equilibrium fractional-order chaotic system and its complete synchronization by circuit implementation
- A robust chaotic algorithm for digital image steganography
- A symmetric image encryption scheme based on 3D chaotic cat maps
- Analysis and improvement of a chaos-based hash function construction
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Classification and generation of disturbance vectors for collision attacks against SHA-1
- Collision analysis of one kind of chaos-based hash function
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
- Collisions of SHA-0 and Reduced SHA-1
- Collisions on SHA-0 in One Hour
- Communication Theory of Secrecy Systems*
- Cryptanalysis of MD4
- Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- Edge detection of noisy images based on cellular neural networks
- Ergodic theory of chaos and strange attractors
- Finding Collisions in the Full SHA-1
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Hash function based on chaotic map lattices
- Hash function based on piecewise nonlinear chaotic map
- How to Break MD5 and Other Hash Functions
- Improving the security of a parallel keyed hash function based on chaotic maps
- Keyed hash function based on a chaotic map
- Multi-region adaptive finite element-boundary element method for elasto-plastic analysis
- On the uniform distribution of a class of discrete spatiotemporal systems
- One Way Hash Functions and DES
- One-way hash function construction based on 2D coupled map lattices
- One-way hash function construction based on the chaotic map with changeable-parameter
- Parallel hash function construction based on coupled map lattices
- Parallel keyed hash function construction based on chaotic maps
- Performance analysis of a chaos shift keying system with polarisation sensitivity under multipath channel
- Selected Areas in Cryptography
- Some new oscillation results for a nonlinear dynamic system on time scales
Cited in
(10)- A fast and efficient chaos-based keyed hash function
- A Novel Hash Function Based on Hyperchaotic Lorenz System
- Chaos Based Hash Function
- A chaos-based hash function with both modification detection and localization capabilities
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
- Chaotic hash function based on the dynamic S-box with variable parameters
- A combined chaotic cryptographic and hashing scheme
- Chaotic hash function based on circular shifts with variable parameters
- Design and Analysis on a Parallel Chaos-Based Hash Function
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
This page was built for publication: A structure-based chaotic hashing scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q327795)