Analysis and improvement of a chaos-based hash function construction
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 5830789 (Why is no real title available?)
- scientific article; zbMATH DE number 5830791 (Why is no real title available?)
- scientific article; zbMATH DE number 503258 (Why is no real title available?)
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- A combined chaotic cryptographic and hashing scheme
- A novel combined cryptographic and hash algorithm based on chaotic control character
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Communication Theory of Secrecy Systems*
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- How to Break MD5 and Other Hash Functions
- One-way hash function construction based on 2D coupled map lattices
- One-way hash function construction based on the chaotic map with changeable-parameter
- Parallel keyed hash function construction based on chaotic maps
Cited in
(29)- scientific article; zbMATH DE number 5584066 (Why is no real title available?)
- Construction, randomness and security of new hash functions derived from chaos mappings
- Collision analysis of one kind of chaos-based hash function
- A new digital signature scheme based on chaotic maps
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Design and Analysis on a Parallel Chaos-Based Hash Function
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- An iterative constrained minimax approach to magnitude response design of FIR evidence filters
- A revised key agreement protocol based on chaotic maps
- A structure-based chaotic hashing scheme
- scientific article; zbMATH DE number 562726 (Why is no real title available?)
- Keyed hash function based on a chaotic map
- A keyed hash function based on the modified coupled chaotic map lattice
- Chaotic hash function based on the dynamic S-box with variable parameters
- An anonymous key agreement protocol based on chaotic maps
- Parallel hash function construction based on coupled map lattices
- A chaos-based hash function with both modification detection and localization capabilities
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Second preimage attack on a chaos-based hash function construction and its improvement
- Constructing chaos-based hash function via parallel impulse perturbation
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Chaotic hash function based on circular shifts with variable parameters
- On the non-negative impulse response of multi-dimensional systems
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- Hash function construction based on the chaotic look-up table with changeable parameter
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
This page was built for publication: Analysis and improvement of a chaos-based hash function construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q718239)